Engineering & Materials Science
Data privacy
100%
Application programs
96%
Security of data
79%
Application programming interfaces (API)
78%
Blockchain
76%
Cryptography
70%
Access control
67%
Cryptocurrency
65%
Public administration
50%
Data Sharing
40%
Cloud computing
39%
Trusted computing
36%
Mobile computing
34%
Peer to peer networks
31%
Activation analysis
30%
Electronic scales
29%
Bitcoin
28%
Industry
28%
Semantics
28%
Interoperability
27%
Transparency
27%
Industrial internet of things (IIoT)
25%
Computer hardware
23%
e-government
23%
Smartphones
22%
Hooks
22%
Edge computing
21%
Outsourcing
21%
Virtual machine
21%
Web services
21%
Rats
21%
Communication
20%
Data integration
20%
Deep learning
15%
Scalability
14%
Silicon
14%
Chemical analysis
13%
Middleware
12%
Websites
10%
Labels
10%
Concretes
10%
Distributed computer systems
9%
Electronic data interchange
9%
Consolidation
9%
Machine learning
8%
Personal computers
8%
Bandwidth
7%
Specifications
7%
Experiments
7%
Chemical activation
7%
eHealth
7%
Reverse engineering
6%
Architectural design
6%
Open source software
6%
European Union
6%
Electronic mail
6%
Metadata
6%
Visibility
5%
Internet of things
5%
Identification (control systems)
5%
Mathematics
Privacy Preserving
55%
Access Control
47%
Service Composition
35%
Communication
27%
Decentralized Control
25%
Actors
24%
Divide and conquer
23%
Middleware
22%
Instant
19%
One to many
18%
Encryption
17%
Policy
17%
Flexibility
16%
Multiplication
14%
Business Process
14%
Business
14%
Electronics
13%
Scenarios
12%
Requirements
11%
Concepts
10%
Key Management
10%
Accountability
10%
Confidentiality
8%
Attribute
8%
Public Key Encryption
8%
Non-repudiation
8%
Performance Evaluation
7%
Integrity
7%
Privacy
7%
Metadata
7%
Bidding
7%
Electronic Mail
6%
Evaluation
6%
Anonymity
6%
Trusted Computing
6%
Compliance
5%
Instantons
5%
Outsourcing
5%
Business & Economics
Privacy
26%
Functionality
24%
Access Control
23%
Hunting
22%
Identity Management
22%
Bitcoin
21%
Apps
19%
Management Control
18%
Federation
18%
Data Security
17%
Node
17%
Inefficiency
15%
Internet of Things
13%
Security Analysis
13%
Decentralized Decision Making
11%
Evaluation
10%
Voting
10%
Emerging Technologies
10%
Web Technology
9%
Currency
8%
Middleware
8%
Integrator
7%
Cryptocurrency
7%
Inspection
7%
IT Infrastructure
7%
Resources
6%
Communication
6%
Key Words
6%
Scenarios
5%
Attack
5%
Experiment
5%
Mobile Applications
5%