Computer Science
Wireless Sensor Network
100%
Password
68%
Network Lifetime
58%
Authentication
39%
public key
38%
Programming Framework
38%
Linear Programming
34%
Sensor Network
30%
graphical password
21%
Energy Dissipation
21%
Sensor Node
19%
Digital Signature
18%
User Authentication
16%
Wireless Network
15%
Human Interaction
13%
Denial-of-Service
13%
Public-Key Cryptography
12%
Public-Key Signature
12%
Mobile Device
10%
Transmission Range
10%
Smart Grid
10%
Computer Hardware
9%
Man-in-the-Middle Attack
9%
Security Analysis
9%
Energy Consumption
9%
Open Source
9%
Mixed Integer Programming
9%
Nonrepudiation
8%
Attribute-Based Access Control
8%
Access Control Policies
8%
Health Information
8%
Security Mechanism
8%
System Parameter
8%
Constrained Device
8%
Authentication Protocol
8%
Password Manager
7%
Security Aspect
7%
Internet Access
7%
Energy Efficiency
6%
proxy signature
6%
Transmission Power
6%
Collected Data
6%
Security Concern
6%
Service Provider
5%
Signature Scheme
5%
Security Service
5%
Web Application
5%
Programming Model
5%
Security Problem
5%
Web Browser
5%
Keyphrases
Wireless Sensor Networks
82%
Network Lifetime
41%
Programming Framework
36%
Linear Programming
24%
One-time Signature
23%
Public Key
23%
Graphical Password
20%
Base Station
19%
Sensor Networks
18%
Sensor Node
16%
One-time Password
16%
User Authentication
16%
User Study
14%
Wireless Sensor Network Lifetime
14%
Energy Dissipation
13%
Denial-of-service Attack
13%
Human Interactive Proof
13%
Energy Cost
13%
Password Security
13%
Digital Signature
11%
Energy Balance
11%
Wireless Security
10%
Wireless Networks
10%
Public Key Cryptography
10%
Prolong Network Lifetime
10%
Smart Grid
10%
Position Paper
9%
Public-key Signature
9%
Android
9%
Man-in-the-middle Attack
9%
Network Level
9%
Security Analysis
9%
Path Length
9%
Energy Consumption
9%
Hash Chain
9%
Mixed Integer Programming
8%
Mobile ID
8%
Device Authentication
8%
Cheating
8%
Transmission Range Control
8%
FIDO2
8%
Non-repudiation
8%
Reverse Path
8%
Attribute-based Access Control
8%
Smart Home
8%
Passwordless
8%
Keystroke Dynamics
8%
Password Manager
8%
Node Level
8%
Mobile Devices
8%