Engineering & Materials Science
Authentication
100%
Blockchain
45%
Biometrics
32%
Machine learning
29%
Energy utilization
27%
Outsourcing
22%
Wireless sensor networks
20%
Network function virtualization
20%
Classifiers
19%
Recovery
17%
Data storage equipment
15%
Intrusion detection
15%
Data privacy
15%
Wearable technology
14%
Cryptography
14%
Data Analytics
14%
Malware
14%
Large dataset
14%
Scalability
13%
Random variables
13%
Hardness
12%
Computational efficiency
12%
Bitcoin
11%
Deep learning
11%
Communication
10%
Glass
10%
Internet
10%
Anomaly detection
8%
Network protocols
8%
Costs
7%
Touch screens
7%
Air
7%
Websites
6%
Ethereum
6%
Machine tools
6%
Application programming interfaces (API)
6%
Sensor nodes
5%
Application programs
5%
Ecosystems
5%
Experiments
5%
Sensor networks
5%
Routers
5%
Smart power grids
5%
Quality of service
5%
Mathematics
Authentication
44%
Attack
38%
Human
26%
Gesture
25%
Malware
22%
Biometrics
20%
Obfuscation
19%
Group Signature
18%
Use Case
16%
Cryptanalysis
16%
Privacy
16%
Signature Scheme
16%
Group Scheme
15%
Glass
15%
Cryptography
14%
Anonymity
13%
Copula
13%
Energy Consumption
13%
Usability
12%
Recovery
12%
Convex Hull
12%
Attribute
12%
Communication
11%
Observation
11%
High-dimensional
10%
Trace
10%
Memory Term
10%
Traceability
9%
Training Samples
8%
Classifier
7%
Privacy Preservation
6%
Query
6%
User Behavior
6%
Peer to Peer
5%
Short Signature
5%
Privacy Preserving
5%
Auditing
5%
Demonstrate
5%