Computer Science
e-government
100%
Cryptocurrency
92%
Security and Privacy
92%
Android
76%
encryption key
61%
Authentication
61%
Arbitrary Number
46%
Access Control
46%
Signature Scheme
46%
Sybil Attack
46%
Peer to Peer Networks
46%
Authenticator
46%
Selection Policy
46%
Decision Policy
46%
Android Application
46%
Intermediate Representation
46%
Backward Compatibility
46%
Device-To-Device
46%
Multi-Access Edge Computing
46%
End User Device
46%
Common Language
46%
Edge Computing
46%
Channel Analysis
46%
Smart Card
46%
Interoperability
46%
Information Technology
46%
Data Security
34%
Use Case
30%
External Resource
30%
Intensive Task
30%
Encryption System
27%
Natural Person
27%
Store Operator
27%
Electronic Signature
26%
e-Business
24%
security level
23%
Automated Attack
23%
Authentication Method
23%
Policy Enforcement
23%
Security Countermeasure
23%
Generative Adversarial Networks
23%
Encrypting Data
23%
Storage Solution
23%
Security Capability
23%
Authorization Framework
23%
Service Interface
23%
Management Function
23%
Integration Pattern
23%
Two-Factor Authentication
23%
Reverse Engineering
23%
Privacy Requirement
23%
Target Advertising
23%
Type Information
23%
Pointer Analysis
23%
Initialization Vector
23%
Adapted Version
23%
Mining Process
23%
Dynamic Program
23%
Intensive Application
23%
Pervasive Computing
23%
Semantic Relationship
23%
Trusted Resource
23%
Resource Identifier
23%
Protection Mechanism
23%
Resource Discovery
23%
Core Functionality
23%
Battery Capacity
23%
Quality Standard
23%
Constant String
23%
Sensitive User Data
23%
Abstract Syntax Tree
23%
Potential Solution
23%
Storage Resource
23%
Legacy Application
23%
Processing Resource
23%
User Data
23%
Service Protection
23%
Electronic Money
23%
Privacy Legislation
23%
Consensus Algorithm
23%
Policy Making
23%
Creation Science
23%
Electronic Mean
23%
Security Feature
23%
Device-To-Device Communication
23%
Privacy Implication
23%
Security Implication
23%
User Communication
23%
Smartcards
23%
Technical Solution
23%
Online Service
23%
Computation Node
23%
Identity Federation
23%
Data Processing
23%
Information Security
23%
Government Service
21%
Unique Identifier
18%
Data Access
15%
Document Format
15%
Ethereum
15%
Security Systems
15%
Provider Attribute
15%
Reactive Security
15%
Legitimate User
15%
Trusted Computing Base
15%
Email Encryption
15%
Protect Sensitive Data
15%
Risk Analysis
15%
Layer Architecture
15%
Minimum Standard
15%
User Authentication
15%
Application Scenario
15%
Party Component
15%
Infrastructure Component
15%
Architectural Design
15%
Code Transformation
15%
Obfuscation Technique
15%
Obfuscation
15%
Data Application
15%
Computing Resource
15%
Integrating Data
15%
Mobile Platform
15%
Access Channel
15%
Password
15%
Identity and Access Management
15%
Practical Experience
15%
Written Consent
15%
Grained Access Control
11%
Write Operation
11%
Potential Countermeasure
11%
Decision-Making
11%
Privacy Breach
11%
Data Privacy
11%
Computing Units
11%
Reducing Latency
11%
Supporting Infrastructure
11%
Commercial Actor
11%
Service Offering
11%
Password Storage
11%
Heterogeneous Platform
11%
Deployment Scenario
11%
Cultural Tradition
11%
Architecture Principle
11%
Access Network
11%
Banking Application
11%
Network File System
10%
public-key infrastructure
9%
Key Authentication
9%
Intended Recipient
9%
Internal Market
9%
Device Communication
9%
Device Identification
9%
Content Provider
9%
Individual Apps
9%
Method Provider
9%
Unique Information
9%
Trusted Domain
7%
Precision Medicine
7%
Security Attribute
7%
Installed Application
7%
Bitcoin
6%
Paramount Importance
6%
Identity Management
6%
Iterative Structure
6%
Technical Requirement
5%
Corporate Sector
5%
Organizational Requirement
5%
Data Integrity
5%
Legal Requirement
5%
Information and Communication Technology
5%
Client-Server Architecture
5%
Responsible Disclosure
5%