Mathematics
Identity-based
40%
Signature Scheme
38%
Password
36%
Attack
36%
Encryption
36%
Identity-based Encryption
34%
Key Exchange
26%
Keyword Search
25%
Privacy
23%
Public key
23%
Authenticated Key Exchange
20%
Broadcast Encryption
20%
Public Key Encryption
19%
Authentication
18%
Revocation
17%
Diffie-Hellman
17%
Anonymity
16%
Sensor Networks
14%
Random Oracle
14%
Radio Frequency Identification
14%
Signature
13%
Group Key Agreement
13%
Key Management
12%
Server
12%
Receiver
12%
Vulnerability
10%
Key Agreement
9%
Security Analysis
9%
Encapsulation
9%
Access Control
8%
Random Oracle Model
8%
Cryptanalysis
8%
Traitor Tracing
8%
Bilinear Map
8%
Security Model
8%
Group Signature
8%
Privacy Preserving
8%
Electronic Mail
7%
Secure Communication
7%
Short Signature
7%
Identity-based Signature
7%
Leakage
7%
Standard Model
6%
Controller
6%
Ring Signature
6%
Ubiquitous Computing
6%
Electronics
6%
Key Agreement Protocol
5%
Key Distribution
5%
Certificate
5%
Engineering & Materials Science
Cryptography
100%
Authentication
65%
Network protocols
39%
Servers
27%
Communication
20%
Access control
19%
Sensor networks
18%
Radio frequency identification (RFID)
17%
Smart cards
17%
Wireless sensor networks
17%
Encapsulation
15%
Secure communication
14%
Sensor nodes
14%
Data privacy
14%
Malware
13%
Mobile computing
11%
IPTV
10%
Costs
10%
Health
8%
Controllers
8%
Flash memory
8%
Biometrics
7%
Intrusion detection
7%
Managers
7%
Wireless networks
7%
Public key cryptography
6%
Flow control
6%
Electronic money
6%
Broadcasting
6%
Glossaries
6%
Electronic document identification systems
6%
Hash functions
6%
Ubiquitous computing
5%
Data storage equipment
5%
Vehicle to vehicle communications
5%
Ad hoc networks
5%
Experiments
5%
Virtualization
5%
Cloud computing
5%
Static analysis
5%
Routing protocols
5%