Computer Science
Internet of Things
100%
Security and Privacy
44%
vehicular ad-hoc network
44%
Authentication
33%
Mobile Application
33%
Blockchain
33%
Wavelet Transforms
33%
Key Exchange Protocol
33%
Watermarking Method
33%
authentication scheme
33%
Security Challenge
33%
Controller Area Network
33%
network intrusion detection
33%
Smart City
22%
Decision Trees
22%
Security Requirements
22%
Ethereum
22%
Decision Tree Classifier
22%
Communication Protocol
22%
Instant Messaging
22%
Authentication Protocol
22%
Optimal Power Allocation
22%
Automatic Repeat Request
22%
Authenticated Key Exchange
22%
Password
11%
Machine Learning Algorithm
11%
Research Paper
11%
Health Care
11%
fault-tolerance
11%
Execution Time
11%
Feature Selection
11%
Performance Evaluation
11%
Optimized Solution
11%
Energy Consumption
11%
Mobile Network
11%
Packet Delivery Ratio
11%
Message Exchange
11%
Vehicular Ad Hoc Network
11%
Sensor Node
11%
cloud system
11%
Data Security
11%
Network Security
11%
Computational Complexity
11%
Data Preprocessing
11%
Fault Tolerant
11%
Privacy Preserving
11%
Smart Card
11%
Wireless Channel
11%
Internet of Vehicles
11%
Sensitive Informations
11%
Security Properties
11%
Intrusion Detection
11%
Raspberry Pi
11%
Confidential Information
11%
chaotic map
11%
Consensus Algorithm
11%
Informal Analysis
11%
Denial of Service Attack
11%
Denial-of-Service
11%
Reversible Watermarking
11%
Insider Attack
11%
authenticated key agreement
11%
Imperceptibility
11%
Performance Requirement
11%
Application Specific Integrated Circuit
11%
Simulation Test
11%
Security Analysis
11%
Vehicular Network
11%
Elliptic Curve
11%
provably secure
11%
Password Guessing
11%
Comparative Survey
11%
Protocol Layer
11%
Future Smart City
11%
Keyphrases
Vehicle-to-everything Communication
100%
Specific Constraints
20%
Secure Message
20%
Smart Vehicle System
20%
Remote Healthcare System
20%
Engineering Feature
20%
Encryption Protocols
20%
Future Smart City
20%
State-of-the-art Models
20%