Engineering & Materials Science
Authentication
100%
Malware
71%
Wireless sensor networks
48%
Internet of things
42%
Network protocols
38%
Blockchain
35%
Deep learning
30%
Data storage equipment
30%
Sensor networks
27%
Sensor nodes
24%
Denial-of-service attack
21%
Cryptography
21%
Internet
20%
Smartphones
20%
Electronic document identification systems
20%
Asynchronous transfer mode
19%
Botnet
19%
Communication
18%
Software defined networking
18%
Biometrics
18%
Machine learning
15%
Recovery
14%
Computer hardware
14%
Sensors
14%
Forward error correction
13%
Detectors
13%
Wireless local area networks (WLAN)
13%
Experiments
13%
Servers
13%
Linux
12%
Polynomials
12%
Public key cryptography
12%
Ad hoc networks
12%
Mobile ad hoc networks
12%
Flow measurement
11%
Cryptocurrency
11%
Bitcoin
11%
Websites
11%
Ecosystems
10%
Radio frequency identification (RFID)
10%
Personal communication systems
10%
Agglomeration
9%
Dynamic random access storage
9%
Monitoring
9%
Electronic money
8%
Costs
8%
Data mining
8%
Scalability
7%
Routing protocols
7%
Flow graphs
7%
Mathematics
Authentication
53%
Wireless Sensor Networks
35%
Sensor Networks
32%
Authentication Protocol
32%
Signature Scheme
25%
Attack
21%
Password
20%
Revocation
20%
Internet of Things
20%
Radio Frequency Identification
20%
Data Aggregation
19%
Key Pre-distribution
18%
Vertex of a graph
18%
Caching
17%
Identification Scheme
16%
Interactive Proofs
16%
Public key
16%
Smart Home
14%
Privacy
14%
Malware
14%
Ad Hoc Networks
14%
Certificate
13%
Vulnerability
13%
Threshold Signature
13%
Countermeasures
12%
Home Network
12%
Key Exchange
11%
Group Signature
11%
Communication
11%
Wireless LAN
11%
DDoS
11%
Zero-knowledge Proof
11%
Forward Security
11%
Medium Access Control
11%
Anonymity
11%
Denial of Service
10%
Mobile Ad Hoc Networks
10%
Protocol Verification
10%
Key Management
9%
Handoff
9%
Biometrics
9%
Proxy Signature
9%
Routing Protocol
9%
Traceability
9%
Grid
8%
Key Agreement
8%
Reputation
8%
Coin tossing
8%
State Machine
8%
Resources
8%