Computer Science
Encryption Scheme
100%
Internet of Things Device
100%
Industrial Internet of Things
100%
Encryption
100%
Internet of Things
100%
Computational Cost
66%
Attribute-Based Encryption
66%
Vulnerability
33%
User Data
33%
Data Confidentiality
33%
Dynamic Network
33%
Application
33%
Computational Efficiency
33%
Searchable Attribute Based Encryption
33%
Data Sharing
33%
Authentication
33%
Multiple Keywords
33%
Computing
33%
Network Topology
33%
Experimental Result
33%
INIS
internet
100%
cryptography
100%
data
50%
devices
37%
cost
37%
vulnerability
12%
dynamics
12%
authentication
12%
data transmission
12%
applications
12%
efficiency
12%
resources
12%
comparative evaluations
12%
security
12%
topology
12%
environment
12%
solutions
12%
Keyphrases
Encryption Protocols
100%
Multi-authority
33%
Dynamic Network Topology
33%
Data Transmission Security
33%
Distributed Internet of Things
33%
Identity Dynamics
33%