Engineering & Materials Science
Authentication
100%
Cryptography
53%
Blockchain
41%
Malware
39%
Sensor networks
39%
Internet of things
38%
Wireless sensor networks
31%
Communication
30%
Servers
25%
Sensor nodes
23%
Network protocols
23%
Software defined networking
20%
Cyber Physical System
20%
Deep learning
20%
Data storage equipment
20%
Sensors
18%
Machine learning
17%
Denial-of-service attack
17%
Electronic document identification systems
16%
Biometrics
16%
IPTV
16%
Internet
14%
Ad hoc networks
12%
Agglomeration
12%
Smart power grids
12%
Smartphones
11%
Polynomials
11%
Asynchronous transfer mode
10%
Botnet
10%
Security systems
10%
Steganography
9%
Machine-to-machine communication
9%
Intrusion detection
9%
Experiments
8%
Radio frequency identification (RFID)
8%
Recovery
8%
Hash functions
8%
Computer hardware
8%
Data privacy
7%
Forward error correction
7%
Detectors
7%
Costs
7%
Wireless local area networks (WLAN)
7%
Linux
7%
Public key cryptography
7%
Network architecture
7%
Industry
7%
Data mining
7%
Mobile ad hoc networks
6%
Neural networks
6%
Jamming
6%
Quantum cryptography
6%
Secure communication
6%
Monitoring
6%
Flow measurement
6%
Cryptocurrency
6%
Ecosystems
6%
Availability
6%
Bitcoin
6%
Anomaly detection
6%
Computer systems
6%
Personal communication systems
5%
Health
5%
Optical character recognition
5%
Access control
5%
Dynamic random access storage
5%
Mathematics
Authentication
45%
Sensor Networks
35%
Attack
27%
Key Management
21%
Wireless Sensor Networks
19%
Authentication Protocol
18%
Vertex of a graph
17%
Signature Scheme
15%
Encryption
15%
Revocation
15%
Privacy
14%
Key Pre-distribution
12%
Password
11%
Internet of Things
11%
Radio Frequency Identification
11%
Data Aggregation
10%
Public key
10%
Caching
9%
Identification Scheme
9%
Certificate
9%
Interactive Proofs
9%
Smart Home
8%
Malware
7%
Ad Hoc Networks
7%
Communication
7%
Anonymity
7%
Threshold Signature
7%
Denial of Service
7%
Collision
7%
Sensor
7%
Homomorphic Encryption
7%
Countermeasures
6%
Home Network
6%
Key Exchange
6%
Group Signature
6%
Forward Security
6%
Resources
6%
Wireless LAN
6%
DDoS
6%
Pairwise
6%
Zero-knowledge Proof
6%
Vulnerability
6%
Medium Access Control
6%
Decentralized
5%
Data Integrity
5%
Smart Grid
5%
Mobile Ad Hoc Networks
5%
Digital Signature
5%
Protocol Verification
5%
Broadcast Encryption
5%
Handoff
5%
Hash Function
5%
System Architecture
5%
Biometrics
5%
Proxy Signature
5%
Routing Protocol
5%
Traceability
5%