Computer Science
Authentication
100%
Malware
89%
Key Distribution
61%
Wireless Sensor Network
60%
secret sharing scheme
57%
authentication scheme
57%
Fault Tolerant
50%
Authentication Protocol
47%
Cybersecurity
43%
Malware Analysis
42%
Computer System
39%
Multicasting
38%
Internet-Of-Things
38%
Intrusion Detection
37%
Android
28%
Video-on-Demand
28%
Software Testing
28%
Operating System
28%
Password
25%
Telecommunication System
22%
Cryptography
22%
Virtual Machine
21%
Encrypted Data
21%
covert channel
21%
One-Way Hash Function
21%
Data Structure
20%
Context Dependent
20%
Security Problem
19%
Access Structure
19%
Mobile Code
19%
threshold scheme
19%
Authentication Key
19%
Private Key Encryption
19%
Plaintext Attack
19%
Encryption Scheme
19%
Packet Classification
19%
Attackers
19%
Software Developer
19%
Network Security
19%
Graphical User Interface
19%
Data Aggregation
19%
Discrete Logarithm
19%
Multicast Protocol
19%
Load Balancing
19%
Multiple Server
19%
Public-Key Cryptosystems
19%
Testbed
19%
Artificial Intelligence
19%
Operational Security
18%
Sensor Node
17%
Keyphrases
Malware
67%
Wireless Sensor Networks
67%
Authentication Scheme
53%
Malware Analysis
44%
Secret Sharing Scheme
37%
Vulnerability
36%
Perfect Secret Sharing Scheme
36%
Adversary
35%
Master Key
33%
Authentication Protocol
33%
Key Distribution Scheme
32%
Computer System
32%
Intrusion Detection
29%
Key Evolving
28%
Internet of Things
28%
Playback
28%
Optimal Information
28%
Information Dispersal
28%
Secure Key
28%
Security Issues
28%
Fault-tolerant
26%
Encrypted Data
25%
Cybersecurity
25%
Secure Authentication
24%
Key Agreement Protocol
24%
Security Threats
24%
Mobile Communication Systems
24%
Mobile Code Systems
24%
World Wide Web
24%
Covert Storage Channel
22%
Smartphone
22%
Subscriber
22%
Virtual Machine
21%
Secure Network
21%
Multicast
21%
Information Rate
20%
Wireless Networks
20%
Key Distribution
20%
Sensor Node
20%
GUI Testing
19%
Threshold Scheme
19%
Authenticated Key Agreement
19%
Data Aggregation
19%
Packet Classification
19%
Discrete Logarithm Problem
19%
Attacker
19%
Distributed Faults
19%
Large-scale Networks
19%
Secure Broadcasting
19%
Graph-based
19%