Keyphrases
Group Authentication
98%
Cloud Computing
80%
Authentication Scheme
62%
Finite Fields
56%
Drone Swarm
56%
Singular Curves
53%
Square Root
53%
Public Cloud
53%
High Security
53%
Hierarchical Key Assignment
53%
Key Assignment Scheme
53%
Key Verification
53%
Drone
53%
Secret Key
45%
UxNB
37%
User Equipment
36%
Analog Computing
35%
Handover
35%
Key Generation
35%
Simultaneous Transmission
35%
Security Protocols
33%
Organizational Unit
31%
Error Performance Analysis
26%
Random Linear Network Coding
26%
Random Networks
26%
Factorial Polynomials
26%
Polynomials over Finite Fields
26%
Strong Pseudoprimes
26%
Odd Characteristic
26%
Device-to-device Caching
26%
Prime numbers
26%
Irreducible Polynomials
26%
Irreducible Polynomials over Finite Fields
26%
Chebotarev Density Theorem
26%
Secure E-commerce
26%
Quantum Key Distribution
26%
Verification Protocol
26%
Embedding Degree
26%
Embedding Class I
26%
Nodal Curves
26%
Binary Quadratic Forms
26%
Connected Autonomous Vehicles
26%
Internet of Vehicles
26%
Privacy-preserving Authentication
26%
E-commerce Companies
26%
Network Coded Cooperation
26%
Data Transmission
26%
Cooperation System
26%
Class number
26%
Network Packet
26%
Computer Science
Authentication
100%
Cloud Computing
80%
Authentication Group
77%
authentication scheme
65%
Public Cloud
53%
Key Generation
53%
Verification Key
43%
Security protocols
40%
Type Communication
37%
Simultaneous Transmission
33%
Function Computation
33%
Key Distribution
32%
Random Network
26%
Device-To-Device
26%
Protocol Verification
26%
security level
26%
Performance Analysis
26%
Autonomous Vehicles
26%
Wireless System
26%
Privacy Preserving
26%
Blockchain
26%
Distributed Denial of Service Attack
26%
Internet of Vehicles
26%
Distributed Denial of Service
26%
Communication Cost
26%
Wireless Sensor Network
26%
User Convenience
26%
Horizontal Scalability
26%
Use Case
26%
Top-Down Approach
26%
Access Schemes
26%
Tangible Benefit
26%
public key
26%
Key Establishment
26%
Computational Cost
23%
Authentication Key
20%
Network Coding
18%
Verification Process
18%
Emerging Technology
18%
Android
18%
Cloud Environment
17%
Spoofing Attack
17%
Denial of Service Attack
17%
Network Packet
16%
Private Cloud
15%
cloud system
15%
Estimation Error
15%
Channel Estimation
15%
Time Difference
13%
Quantum Channel
13%