Computer Science
Authentication
100%
User
75%
Multi-Access Edge Computing
60%
Application
55%
Key Management
52%
Networks
48%
Privacy Preserving
34%
Mobile Network
30%
ad-hoc network
30%
Service
29%
Attack
22%
Credentials
22%
Network Service
22%
Diffie-Hellman-Merkle key exchange
22%
Models
21%
Security and Privacy
19%
Privacy Requirement
19%
Links
17%
Network Security
17%
Synchronization
16%
Protection Mechanism
16%
User Privacy
16%
Generation
16%
Application Support
15%
Edge Computing
15%
Message Transmission
15%
Security Mechanism
15%
Authentication Protocol
15%
Transmission Time
15%
Sensor Reading
15%
Symmetric Key Cryptography
15%
model checker
15%
Protection Scheme
15%
Access Management
15%
Service Control
15%
Trusted Application
15%
Use Case
15%
Risk Management
15%
Proposed Mechanism
15%
Automated Data
15%
Security Management
15%
identity-based cryptography
15%
Authentication System
15%
Subscriber Identity
15%
Wireless Networks
15%
Digital Signature
15%
Diffie-Hellman Key Exchange
15%
Communication Device
10%
Application Service
9%
Standards
9%