Keyphrases
Inter-vehicle Communication
50%
Pronounceability
50%
Mission Assurance
50%
Mission Impact
50%
Impact Graph
50%
Hands-on Lab
50%
Computing Assessment
50%
Computing Design
50%
WireGuard
50%
Distributed Learning
50%
Administrative Model
50%
OpenVPN
50%
Homomorphic Encryption
50%
Design Assessment
50%
Relationship-based Access Control
50%
Attribute-aware
50%
Detecting Location
50%
Location Spoofing
50%
Open Collaboration
50%
Provenance-aware
50%
System Call Sequence
50%
Syscalls
50%
Passphrase
50%
Third-party Applications
50%
Social Computing Systems
50%
CAPTCHA
50%
Social Computing
50%
Control Activities
50%
Cryptographic Algorithms
50%
Activity-centric Access Control
50%
Access Authentication
50%
Creation Strategy
25%
Peer-to-peer Exchange
25%
User-experts
25%
Password Change
25%
Certificate-based
25%
Cryptographic Solutions
25%
Cryptographic Operations
25%
Password Security
25%
Cross-site
25%
Dictionary Attack
25%
Weak Password
25%
Password Guessing
25%
Rule Derivation
25%
Spoofing Attack Detection
25%
Guessing Attack
25%
Twofish
25%
CAPTCHA Security
25%
ChaCha20
25%
CAPTCHA Usability
25%
Computer Science
Access Control
100%
Control Activity
75%
Vehicular Communication
60%
Assessment Design
50%
Spoofing Attack
50%
Online Social Networks
50%
Distributed Learning
50%
Cryptographic Algorithm
50%
Virtual Private Network
50%
Mission Assurance
50%
Vehicular Network
50%
Party Application
50%
Passphrase
50%
CAPTCHA
50%
Social Computing
50%
World Application
50%
Security and Privacy
50%
Develop Solution
50%
Authentication
50%
Cryptographic Operation
25%
Vehicle-to-Vehicle Communication
25%
Authoritative Server
25%
Multicore
25%
Automated Test
25%
eBay
25%
Graphical Model
25%
Negative Experience
16%
Control Framework
12%
Advanced Encryption Standard
12%
Expressive Power
10%
Programming Language Feature
10%
Intelligent Transportation System
10%
Communication Overhead
10%
Data Provenance
10%
Modern Operating System
10%
Location Information
10%
Learning Community
10%
Form Relationship
10%
Communication Network
10%
Relationship Type
10%
Multiple Relationship
10%
Physical Layer
10%
Malicious Activity
10%
Role-Based Access Control
7%
Research Frontier
7%
Integrity Constraint
7%
Grained Control
7%
Authorization Policy
7%
System Activity
7%
Session Management
7%