Mathematics
Architecture
16%
Attack
69%
Authenticated Key Exchange
42%
Authentication
46%
Authentication Protocol
39%
Certificate
15%
Communication
13%
Countermeasures
27%
Cryptanalysis
38%
Cryptosystem
13%
Diffie-Hellman
18%
Digital Rights Management
21%
Electronic Voting
15%
Electronics
17%
Fault
16%
Grid Service
14%
Group Communication
13%
Group Key Agreement
72%
Group Signature
25%
Hardware
15%
Hash Chain
16%
Identity-based
26%
Interoperability
37%
Key Agreement
14%
Key Agreement Protocol
28%
Key Distribution
13%
Key Exchange
28%
Key Management
23%
Location-based Services
24%
Middleware
13%
Mobile Computing
13%
Mobile Devices
49%
Password
48%
Password Authentication
29%
Privacy
29%
Profile
12%
Provable Security
13%
Proxy Signature
20%
Public key
18%
Radio Frequency Identification
85%
Secure Communication
13%
Security Analysis
32%
Server
19%
Signature
14%
Signature Scheme
31%
Smart Card
35%
Ubiquitous Computing
16%
User Authentication
13%
Watermarking
15%
Web Services
25%
Engineering & Materials Science
Acceptance tests
7%
Application programs
10%
Authentication
100%
Bitcoin
17%
Blockchain
23%
Broadcasting
11%
Cathode ray tubes
14%
Communication
27%
Computer hardware
7%
Costs
9%
Cryptocurrency
22%
Cryptography
70%
Data acquisition
10%
Data privacy
10%
Data Sharing
13%
Data storage equipment
7%
Defects
31%
Digital forensics
7%
Electronic document identification systems
28%
Electronic voting
34%
Hash functions
17%
Industry
11%
Information management
8%
Internet
35%
Internet of things
14%
Interoperability
28%
Local area networks
11%
Location based services
13%
mHealth
7%
Mobile computing
34%
Multicasting
7%
Network protocols
61%
Public key cryptography
11%
Radio frequency identification (RFID)
61%
Recovery
9%
SCADA systems
17%
Security of data
18%
Sensor networks
7%
Servers
26%
Silicon
9%
Smart cards
42%
Smartphones
7%
Supply chains
7%
Ubiquitous computing
16%
Voting machines
13%
Watermarking
13%
Web services
15%
Wide area networks
7%
Wireless networks
8%
XML
13%