Keyphrases
Private Set Intersection
77%
Privacy-preserving
36%
Symmetric Key
33%
Workload Allocation
29%
Contact Tracing
28%
Semi-honest
25%
Format-preserving Encryption
22%
Oblivious Transfer Extension
22%
Feistel
19%
Private Set Intersection Cardinality
18%
Pseudorandom Functions
16%
Client-server
16%
Key-value Store
16%
Edge Computing
14%
Edge Nodes
14%
Technical Core
13%
Large Domain
13%
Concept Implementation
13%
Oblivious PRF
13%
Preserving Privacy
12%
Malicious Setting
12%
Numerical Results
12%
Two-party
12%
Distinguishing Attack
11%
Slide Attack
11%
Shared Outputs
11%
Server-aided
11%
Encryption Standard
11%
Known-plaintext Attack
11%
Private Set Union
11%
Cache Sharing
11%
Prescription Drug Management
11%
Fully Homomorphic Encryption
11%
Lightweight Clients
11%
Wildcard Pattern Matching
11%
Private Information Retrieval
11%
Vaccine Passport
11%
Edge Service Placement
11%
Encrypted Data Sharing
11%
Cooperative Caching
11%
Garbled Circuits
11%
Cut-and-choose
11%
Distributed Algorithms
11%
Edge Cloud
11%
Node Placement
11%
Battery Storage
11%
System Research
11%
General Domain
11%
Cardinality
11%
Urban Transit System
11%
Computer Science
Private Set Intersection
100%
Privacy Preserving
51%
Cardinality
22%
Edge Computing
18%
Malicious Adversary
18%
public key
17%
Secure Protocol
16%
User Privacy
16%
Building-Blocks
11%
Multiple Network
11%
Speed-up
11%
Data Sharing
11%
Large Data Set
11%
Small Experiment
11%
Data Item
11%
Fully Homomorphic Encryption
11%
Linear Program
11%
PSI Cardinality
11%
Encrypted Data
11%
Intersection Set
11%
Client Server
11%
Parameter Value
11%
Optimization Problem
11%
Network Security
11%
Security Requirements
11%
Network Operator
11%
Parallelization
11%
Plaintext Attack
11%
Security Concern
11%
Distributed Algorithm
11%
Service Provider
11%
Wildcard
11%
Ciphertext
11%
Pattern Matching
11%
Information Retrieval
11%
User Experience
9%
Internet-Of-Things
9%
Privacy Concern
8%
Cuckoo Hashing
7%
Access Pattern
7%
Data Structure
7%
Diffie-Hellman-Merkle key exchange
6%
Local Area Network
5%
Optimization Framework
5%
Bandwidth Requirement
5%
Security Attack
5%
Privacy Preserving Machine Learning
5%
Privacy Protection
5%
Robust Solution
5%
Client-Server Model
5%