Keyphrases
Access Pattern
14%
Battery Storage
11%
Cache Sharing
11%
Client-server
27%
Concept Implementation
13%
Contact Tracing
28%
Cooperative Caching
11%
Cut-and-choose
11%
Data Dependency
14%
Distinguishing Attack
11%
Distributed Algorithms
11%
Edge Cloud
11%
Edge Computing
18%
Edge Nodes
14%
Edge Service Placement
11%
Encrypted Data Sharing
11%
Encryption Standard
11%
Feistel
19%
Format-preserving Encryption
22%
Fully Homomorphic Encryption
11%
Garbled Circuits
11%
Key-value Store
16%
Known-plaintext Attack
11%
Large Domain
13%
Lightweight Clients
11%
Malicious Setting
12%
Node Placement
11%
Numerical Results
15%
Oblivious PRF
13%
Oblivious Transfer Extension
22%
Prescription Drug Management
11%
Preserving Privacy
12%
Privacy-preserving
36%
Private Information Retrieval
11%
Private Set Intersection
77%
Private Set Intersection Cardinality
18%
Private Set Union
11%
Pseudorandom Functions
16%
Secure Computation
17%
Semi-honest
29%
Server-aided
22%
Shared Outputs
22%
Slide Attack
11%
Symmetric Key
33%
System Research
11%
Technical Core
13%
Two-party
12%
Vaccine Passport
11%
Wildcard Pattern Matching
11%
Workload Allocation
29%
Computer Science
Access Pattern
14%
Attackers
11%
Bandwidth Requirement
5%
Building-Blocks
11%
Cardinality
22%
Ciphertext
11%
Client Server
22%
Cuckoo Hashing
7%
Data Item
11%
Data Sharing
11%
Data Structure
7%
Diffie-Hellman-Merkle key exchange
6%
Distributed Algorithm
11%
Edge Computing
25%
Encrypted Data
11%
Fully Homomorphic Encryption
11%
Information Retrieval
11%
Internet-Of-Things
9%
Intersection Set
11%
Large Data Set
11%
Linear Program
11%
Local Area Network
5%
Malicious Adversary
18%
Multiple Network
11%
Network Latency
7%
Network Operation
11%
Network Operator
11%
Network Security
11%
Optimization Framework
5%
Optimization Problem
11%
Parallelization
11%
Parameter Value
11%
Pattern Matching
11%
Plaintext Attack
11%
Privacy Concern
8%
Privacy Preserving
51%
Private Set Intersection
100%
PSI Cardinality
11%
public key
17%
Secure Protocol
16%
Security Attack
5%
Security Concern
11%
Security Requirements
11%
Service Provider
11%
Small Experiment
11%
Speed-up
11%
User Experience
9%
User Privacy
16%
Wildcard
11%
World Application
7%