Computer Science
Cryptocurrency
100%
User
88%
Data Access
88%
Access Control
77%
Attribute-Based Encryption
66%
Cryptography
66%
Authenticator
66%
Computation
66%
External Resource
66%
Edge Computing
66%
Multi-Access Edge Computing
66%
Device-To-Device
66%
Selection Policy
66%
Evaluation
66%
Android Application
66%
Privacy Preserving
66%
Android
55%
Cryptographic Device
44%
Personal Data
44%
Identification Model
33%
Constant String
33%
Semantic Relationship
33%
Common Language
33%
Privacy Requirement
33%
Creation Science
33%
Electronic Money
33%
Trusted Resource
33%
Electronic Mean
33%
Security Protection
33%
Intensive Task
33%
End User Device
33%
Intensive Application
33%
Management Function
33%
Pervasive Computing
33%
Resource Discovery
33%
Security Capability
33%
Integration Pattern
33%
Core Functionality
33%
Resource Identifier
33%
Dynamic Program
33%
Text Classification
33%
Abstract Syntax Tree
33%
Computing Power
33%
Authorization Framework
33%
Service Interface
33%
Battery Capacity
33%
Sensitive User Data
33%
Protection Mechanism
33%
Consensus Algorithm
33%
Computation Node
33%
Unique Identifier
26%
Provider Attribute
22%
Ethereum
22%
Semantic Technology
22%
Identity and Access Management
22%
Privacy Concern
22%
Two-Factor Authentication
22%
Open Standard
22%
Security Systems
22%
Reactive Security
22%
password authentication
22%
encryption key
22%
Privacy Implication
22%
Security Implication
22%
Device-To-Device Communication
22%
User Communication
22%
Infrastructure Component
22%
Outsourcing
22%
Potential Solution
22%
Party Component
22%
Application Security
22%
Obfuscation
22%
Data Application
22%
Obfuscation Technique
22%
Integrating Data
22%
Code Transformation
22%
Intermediate Representation
22%
Legitimate User
22%
Trusted Computing Base
22%
Backward Compatibility
19%
Online Service
16%
Privacy Legislation
16%
Mining Process
16%
Security Countermeasure
16%
Peer to Peer Networks
16%
Sybil Attack
16%
Reverse Engineering
16%
Write Operation
16%
Attack
16%
Automated Attack
16%
Potential Countermeasure
16%
Access Network
16%
Computing Units
16%
Reducing Latency
16%
Grained Access Control
16%
Generative Adversarial Networks
16%
Security Feature
16%
Target Advertising
16%
Network File System
14%
Laptop
13%
Protect Sensitive Data
13%
Storage Solution
13%
Distributed Application
13%
Device Identification
13%
Device Communication
13%
Content Provider
13%
Precision Medicine
11%
Trusted Domain
11%
General Data Protection Regulation
11%
Control
11%
Installed Application
11%
Statistics
11%
Machine Learning
11%
Security Attribute
11%
Pointer Analysis
11%
Adapted Version
11%
Type Information
11%
Initialization Vector
11%
Government Service
9%
Paramount Importance
9%
Protection Issue
9%
Privacy Protection
9%
Service Protection
9%
User Data
9%
Legacy Application
9%
Identity Management
9%
Bitcoin
9%
Security Design
9%
Responsible Disclosure
7%
Client-Server Architecture
7%
Social Sciences
Electronic Engineering
66%
Information Technology
66%
Security
66%
Knowledge
33%
Health Service
33%
Constitution
33%
Justice
33%
Finance
33%
National Security
33%
Organizations
33%
Communities
33%
Science
33%
Technology
33%
Industrial Sector
33%
Universities
33%
Public Administration
33%
Economic Framework
33%
Money
33%
Associations
33%
Parliament
33%
Mission
33%
Advancement
33%
Government Departments
33%
Information
33%
Legislation
28%
Semantics
19%
EU Policy
9%
Service Sector
9%
European Community
9%
Right to Privacy
9%