Keyphrases
Group Authentication
100%
Cloud Computing
64%
Secret Key
52%
Analog Computing
49%
Authentication Scheme
48%
Finite Fields
45%
Drone Swarm
45%
Singular Curves
42%
Square Root
42%
Public Cloud
42%
High Security
42%
Hierarchical Key Assignment
42%
Key Assignment Scheme
42%
Key Verification
42%
Drone
42%
Secret Key Generation
42%
Authentication Mechanism
41%
UxNB
29%
User Equipment
29%
Handover
28%
Key Generation
28%
Simultaneous Transmission
28%
Security Protocols
26%
Prime numbers
26%
Organizational Unit
25%
Error Performance Analysis
21%
Random Linear Network Coding
21%
Random Networks
21%
Factorial Polynomials
21%
Polynomials over Finite Fields
21%
Strong Pseudoprimes
21%
Odd Characteristic
21%
Device-to-device Caching
21%
Irreducible Polynomials
21%
Irreducible Polynomials over Finite Fields
21%
Chebotarev Density Theorem
21%
Secure E-commerce
21%
Quantum Key Distribution
21%
Verification Protocol
21%
Embedding Degree
21%
Embedding Class I
21%
Nodal Curves
21%
Binary Quadratic Forms
21%
Connected Autonomous Vehicles
21%
Internet of Vehicles
21%
Privacy-preserving Authentication
21%
E-commerce Companies
21%
Network Coded Cooperation
21%
Data Transmission
21%
Cooperation System
21%
Computer Science
Authentication
90%
Cloud Computing
64%
Key Generation
64%
Authentication Group
61%
authentication scheme
48%
Function Computation
48%
Public Cloud
42%
Autonomous Vehicles
42%
Verification Key
34%
Authentication Method
32%
Type Communication
29%
Simultaneous Transmission
26%
Estimation Error
23%
Channel Estimation
23%
Security protocols
21%
Random Network
21%
Device-To-Device
21%
security level
21%
Performance Analysis
21%
Wireless System
21%
Privacy Preserving
21%
Blockchain
21%
Distributed Denial of Service Attack
21%
Internet of Vehicles
21%
User Convenience
21%
Horizontal Scalability
21%
Use Case
21%
Top-Down Approach
21%
Access Schemes
21%
Tangible Benefit
21%
public key
21%
Key Establishment
21%
Quantum Cryptography
21%
Protocol Verification
21%
Wireless Sensor Network
21%
Public Transportation
21%
Computational Cost
18%
Preprocessing
17%
Authentication Key
16%
Network Coding
14%
Emerging Technology
14%
Verification Process
14%
Wireless Communication
14%
Cloud Environment
14%
Spoofing Attack
14%
Network Packet
12%
Private Cloud
12%
cloud system
12%
Time Difference
10%
Communication Device
10%