Keyphrases
- cryptographic algorithms
- cryptographic protocols
- public key cryptography
- cellular automata
- information security
- proxy re encryption
- trusted third party
- standard model
- security requirements
- security level
- security issues
- user modeling
- user profiling
- security protocols
- bilinear pairings
- key management
- user preferences
- context aware
- collaborative filtering
- recommender systems
- e learning
- sensitive data
- user model
- music retrieval
- proxy servers
- secure communication
- user profiles
- data encryption
- personalized information