Keyphrases
Automatic Differentiation
100%
Mobile Ad Hoc Network (MANET)
53%
Security Protocols
44%
Access Control
42%
Hertfordshire
41%
Reverse Accumulation
37%
Access Control Model
35%
Wireless Sensor Networks
35%
Reputation System
34%
Attacker
34%
Software Defect Prediction
33%
Oxford
28%
Hessian
25%
Optimization Problem
23%
Robot Companion
23%
Trust Assumption
22%
Cryptographic
22%
Dynamic Reputation
21%
Positive Fixed Point
21%
Bit Pattern
21%
Cryptographic Key
21%
Anonymity
21%
Target Function
21%
Distributed Documents
21%
Computing Environment
21%
Medical Data
21%
Robot Behavior
21%
Human-robot Interaction
20%
Medium Access Control Layer
19%
Defect Prediction
18%
Misbehaving Nodes
18%
Banach Lattice
17%
Metric Data
17%
Taylor Series
17%
Newton Direction
17%
Security Issues
17%
Global Convergence
17%
Insecurity
17%
Scalar
16%
Second-order Adjoint
16%
Tamper-evident
16%
Document Processing
16%
Order Continuous Norm
15%
Medium Access Control
15%
Adaptive Access Control
15%
Positive Linear Operators
14%
Semigroup
14%
Keys Certificate
14%
Electronic Key
14%
Merkle Puzzles
14%
Computer Science
Authentication
63%
Access Control
49%
Access Control Policies
48%
mobile ad-hoc network
44%
Defect Prediction
44%
Security protocols
41%
Software Defect
41%
Attackers
40%
Robot
35%
Wireless Sensor Network
35%
Computer Hardware
34%
Reputation Management
33%
Cryptographic Key
32%
public key
30%
Trust Management
27%
Taylor Series
25%
Internet-Of-Things
22%
Computing Environment
22%
Anonymity
21%
Document Processing
21%
Media Access Control
19%
IEEE 802.11
19%
Misbehaving Node
18%
Distributed Systems
18%
Data Program
17%
Hash Function
17%
Public-Key Cryptography
16%
Public Key Certificate
16%
Code Metrics
15%
Target Function
15%
Trust Relationship
14%
Superscalar
14%
Key Certificate
14%
Distributed Processing
14%
High Availability
14%
Hierarchy Management
14%
Distributed Object
14%
Computer System
14%
Transitive Trust
14%
Associative Memory
14%
Constrained Optimization
14%
Infrastructure System
14%
Fortran
14%
Media Access Control Protocol
13%
Network Performance
13%
Botnets
12%
Support Vector Machine
12%
Pervasive Computing
12%
Authentication Server
11%
Security Policy
11%