access accountable achieving adaptive adaptively admission against algorithm allocation analysis android anonymity anonymous appic architecture assisted attribute auction auditability auditable authentication awareness based behavior behind break cellular challenges changing cloud communications computing control controlled cooperative critical cross cryptography cryptosystem customized dealing decentralized deduplication defense delay dependable description design detection disaster distributed domain downlink downlinks dynamic dynamically economic efficient ehealth electronic emergency encrypted encryption estimation files finding framework generation glass grained handoff health healthcare hidden hybrid identification identity implicit information keyword large layer leveraging lightweight location matching mechanism misbehavior missing mobile multi network networking networks novel online opportunities opportunity outsourcing ownership packet paillier password patient personaia power practical preserving prioritizing privacy private privilege processing profile proof protecting proximity purging query record repudiation rescue rescueme resource response retraining retrieval revocation robust scene scheduling scheme search secure security selection selfish sensor sharing simulations situational smart social spectral spectrum steganography storage supporting system systems technique threshold tiered towards traceability traffic transmission unattended unified vanets vehicular voice wireless