Computer Science
Cryptocurrency
100%
Blockchain
93%
Bitcoin
76%
Evaluation
72%
Attribute-Based Encryption
66%
Computing Domain
66%
Activation Pattern
66%
External Resource
66%
Business Application
66%
Android Security
66%
Service
66%
Phishing
66%
Phish
66%
Data Sharing
66%
User
66%
Cryptography
66%
Instant Messaging
66%
Cloud Storage
66%
Distributed Resource
66%
Security Management
66%
Based Data Integration
66%
Technology Option
66%
Edge Computing
66%
Multi-Access Edge Computing
66%
Device-To-Device
66%
Access Control
66%
Android Application
66%
Integration Platform
66%
Business Process
66%
Federated Cloud
66%
Cloud Environment
66%
Outsourcing
55%
Android
55%
Private Cloud
44%
encryption key
44%
Electronic Communication
40%
Identification Model
33%
Constant String
33%
Semantic Relationship
33%
Common Language
33%
Security Protection
33%
Management Function
33%
Security Capability
33%
Integration Pattern
33%
Core Functionality
33%
Resource Identifier
33%
Dynamic Program
33%
Key Application
33%
Battery Capacity
33%
Protection Mechanism
33%
Consensus Algorithm
33%
Focus Area
33%
Virtualized Computing
33%
Development Environment
33%
Cloud Technology
33%
Cloud Computing Paradigm
33%
Trusted Resource
33%
Intensive Task
33%
End User Device
33%
Intensive Application
33%
Pervasive Computing
33%
Resource Discovery
33%
Text Classification
33%
Abstract Syntax Tree
33%
Security Challenge
33%
cloud system
33%
Computing Power
33%
Technology Solution
33%
Authorization Framework
33%
Service Interface
33%
Privacy Challenge
33%
Sensitive User Data
33%
Individual Project
33%
Integration Framework
33%
Process Execution
33%
Premise Application
33%
Cloud Application
33%
Security Assessment
33%
Authorisation
33%
Service Composition
33%
Domain Service
33%
Unique Identifier
26%
Malicious Application
26%
Federation Service
26%
Level Architecture
26%
Semantic Technology
22%
Identity and Access Management
22%
Privacy Concern
22%
Privacy Requirement
22%
Performance Penalty
22%
Connected Application
22%
Client Application
22%
Programs
22%
Back End
22%
Control Operator
22%
Infrastructure Component
22%
Potential Solution
22%
Party Component
22%
Trusted Computing Base
22%
Certificate Authority
22%