Keyphrases
Access Control
42%
Access Control Model
35%
Adaptive Access Control
15%
Anonymity
21%
Attacker
34%
Automatic Differentiation
100%
Banach Lattice
17%
Bit Pattern
21%
Computing Environment
21%
Cryptographic
22%
Cryptographic Key
21%
Defect Prediction
18%
Distributed Documents
21%
Document Processing
16%
Dynamic Reputation
21%
Electronic Key
14%
Global Convergence
17%
Hertfordshire
41%
Hessian
25%
Human-robot Interaction
20%
Insecurity
17%
Keys Certificate
14%
Medical Data
21%
Medium Access Control
15%
Medium Access Control Layer
19%
Merkle Puzzles
14%
Metric Data
17%
Misbehaving Nodes
18%
Mobile Ad Hoc Network (MANET)
53%
Newton Direction
17%
Optimization Problem
23%
Order Continuous Norm
15%
Oxford
28%
Positive Fixed Point
21%
Positive Linear Operators
14%
Reputation System
34%
Reverse Accumulation
37%
Robot Behavior
21%
Robot Companion
23%
Scalar
16%
Second-order Adjoint
16%
Security Issues
17%
Security Protocols
44%
Semigroup
14%
Software Defect Prediction
33%
Tamper-evident
16%
Target Function
21%
Taylor Series
17%
Trust Assumption
22%
Wireless Sensor Networks
35%
Computer Science
Access Control
49%
Access Control Policies
48%
Anonymity
21%
Associative Memory
14%
Attackers
40%
Authentication
63%
Authentication Server
11%
Botnets
12%
Code Metrics
15%
Computer Hardware
34%
Computer System
14%
Computing Environment
22%
Constrained Optimization
14%
Cryptographic Key
32%
Data Program
17%
Defect Prediction
44%
Distributed Object
14%
Distributed Processing
14%
Distributed Systems
18%
Document Processing
21%
Fortran
14%
Hash Function
17%
Hierarchy Management
14%
High Availability
14%
IEEE 802.11
19%
Infrastructure System
14%
Internet-Of-Things
22%
Key Certificate
14%
Media Access Control
19%
Media Access Control Protocol
13%
Misbehaving Node
18%
mobile ad-hoc network
44%
Network Performance
13%
Pervasive Computing
12%
public key
30%
Public Key Certificate
16%
Public-Key Cryptography
16%
Reputation Management
33%
Robot
35%
Security Policy
11%
Security protocols
41%
Software Defect
41%
Superscalar
14%
Support Vector Machine
12%
Target Function
15%
Taylor Series
25%
Transitive Trust
14%
Trust Management
27%
Trust Relationship
14%
Wireless Sensor Network
35%