Keyphrases
Authenticated Data Structures
66%
Blockchain
54%
Query Result
53%
Service Provider
52%
Query Authentication
50%
Set-valued Data
50%
Aggregate Query
50%
Confidentiality
50%
As-a-service
44%
Query Processing
43%
Blockchain Database
41%
Data Owner
36%
Blockchain System
33%
Untrusted Cloud
31%
Search Engine
31%
Query Integrity
31%
Verifiable Query
29%
Data Outsourcing
29%
Authenticated Query
27%
Security Analysis
25%
Top-k Ranking
25%
Extended Abstracts
25%
Boolean Range Query
25%
Shared Cloud Data
25%
Location Disclosure
25%
Message Authentication Code
25%
Public Blockchain
25%
Log Auditing
25%
Consistency Verification
25%
Cluster Boundary
25%
Large-scale Image Retrieval
25%
Neighbourhood Space
25%
Nearest Neighbor Query
25%
Attribute-based
25%
Content-based Image Retrieval
25%
Boundary Detection
25%
Mobile Devices
25%
Range Query
25%
Verifiable Search
25%
Reducing Uncertainty
25%
Cloud Storage
25%
High-dimensional Data
25%
2-tree
25%
Crowdsourcing
25%
Effective Structure
25%
Spatiotemporal
25%
Cloud Computing
23%
Result Integrity
22%
Authentication Scheme
22%
Cloud-based
20%
Common Data
20%
Image Retrieval
20%
Data Integrity
18%
Take-the-first
18%
Assurance Schemes
16%
Verifier
16%
Verification Object
16%
Ethereum
16%
Integrity Assurance
16%
Location-based Services
16%
Authentication Mechanism
16%
Privacy-preserving Authentication
15%
Cryptographic Proofs
14%
Increased Demand
14%
Query Performance
14%
K-nearest Neighbor (K-NN)
14%
Cloud Service Provider
14%
Access Management
12%
Search Experience
12%
Risk of Losing Control
12%
High Security Application
12%
Cloud Data
12%
Integrity Management
12%
Merkle
12%
Maintenance Cost
12%
Third-party Providers
12%
Data Access
12%
Fulcrum
12%
Cryptocurrency
12%
Knowledge Approach
12%
Fine-grained Access Control
12%
Zero-knowledge
12%
Hybrid Storage
12%
Search Service
12%
Business Intelligence
11%
Query Services
11%
Data Confidentiality
11%
Recent Advances
11%
Source Data
11%
Blockchain Security
8%
Cloud Client
8%
Race Condition
8%
Testnet
8%
Client-server
8%
Blockchain Service
8%
Query Operations
8%
Blockchain Applications
8%
Signature Authentication
8%
Conventional Scheme
8%
Prefix
8%
Digital Text
8%
Verifiable Messages
8%
Plaintext
8%
Malicious Parties
8%
Spatio-temporal Data
8%
Design Index
8%
Solidity
8%
Functional Prototype
8%
Smartphone-based
8%
Design Motivations
8%
Malicious Clients
8%
Malicious Server
8%
Overhead Time
8%
Verification Time
8%
Query Cost
8%
Verification Cost
8%
Centralized Environment
8%
Small-sized Enterprises
8%
Medium-sized Enterprises
8%
Three-party
8%
Order of Magnitude
8%
Real-world Application
8%
Spatial Analytics
8%
Client-centered
8%
Location Tracking
8%
Design Protocol
8%
Cloud Server
8%
Search Queries
8%
Mobile Client
8%
Image Database
8%
Communication Cost
8%
Communication Overhead
8%
Query-based
8%
Granules
8%
Distributed Environment
8%
Untrusted
8%
Web Client
8%
Security Protocols
8%
Code-based
8%
Spatial Data
8%
Processing Framework
8%
Spatial-temporal
8%
Graphical User Interface
8%
Evaluation Results
8%
User Privacy
8%
Interactive Experience
8%
Optimization Algorithm
8%
Cloud Services
8%
Digital Signature
8%
Blockchain Fork
8%
User Location
8%
Verification Algorithm
6%
Crowdsourcing Tasks
6%
Uncertain Database
6%
Kd-tree
6%
Image File
6%
Dynamic Aggregation
6%
Cuckoo Filter
6%
Decentralized Applications
6%
Image Retrieval System
6%
Computing Cost
6%
Cloud Platform
6%
Query Operators
6%
Neighborhood Analysis
6%
Block Data
6%
Query Verification
6%
Cleaning Model
6%
Query Attributes
6%
Crowdsourcing Model
6%
Trust Computation
6%
Structures Maintenance
6%
Trusted Storage
6%
Two-level Index
6%
Inevitability
6%
Verification Complexity
6%
Single-perspective
6%
Systemic Design
6%
Inter-block
6%
Data Collection Algorithm
6%
Boundary Detection Algorithm
6%
Lever Principle
6%
Communication Complexity
6%
Online Image
6%
Inverted Index
6%
Prefix Tree
6%
Search Complexity
6%
Small to Medium Size Enterprises
6%
Existing Techniques
6%
Design Strategy
6%
Reduction Method
6%
Huge Data
6%
Boundary Objects
6%
Subscription
6%
Ranking Queries
6%
Structure Optimization
6%
Data Cleaning
6%
Subjective Data
6%
Efficient Query
6%
Gas Cost
6%
Off-chain Storage
6%
Computer Science
Blockchain
100%
Service Provider
68%
Authentication
66%
Cloud Computing
58%
Data Structure
52%
Query Processing
50%
Range Query
50%
Authentication Technique
41%
Data Confidentiality
33%
Decision-Making
33%
Business Intelligence
33%
Image Retrieval
33%
Search Engine
31%
Data Integrity
30%
Security Analysis
27%
Content-based image retrieval
25%
Subjective Data
25%
Search Experience
25%
Service Architecture
25%
Integrity Management
25%
Access Management
25%
Message Authentication Code
25%
Party Service Provider
25%
Privacy Preserving
25%
near neighbor query
25%
Service to User
25%
Random Selection
25%
Data Cleaning
25%
Efficient Algorithm
25%
Data Type
25%
Boundary Detection
25%
Data Access
25%
Mobile Device
25%
Underlying Data
25%
High Dimensional Data
25%
Selection Method
25%
Cloud Storage
25%
Security Application
25%
Grained Access Control
25%
authentication scheme
22%
Location-Based Service
16%
Sized Enterprise
14%
Data Characteristic
12%
Multiple Perspective
12%
Boundary Object
12%
Cluster Analysis
12%
Detection Algorithm
12%
Dimensional Data Set
12%
Cryptocurrency
9%
Graphical User Interface
8%
Authentication Protocol
8%
Image Database
8%
Distributed Data Structure
8%
Centralized Environment
8%
Communication Overhead
8%
Tracking (Position)
8%
Computer Hardware
8%
Building-Blocks
8%
Distributed Environment
8%
User Privacy
8%
Experimental Result
8%
Good Performance
8%
Ethereum
8%
Data Analytics
8%
Digital Signature
8%
Spatiotemporal Data
8%
Image Retrieval System
6%
Inverted Index
6%
Cloud Platform
6%
Design Strategy
6%
Information Retrieval
6%
Cloud Service Provider
6%
Optimization Technique
6%
Query Performance
5%
Index Structure
5%
Consensus Protocol
5%
Metadata
5%