Keyphrases
Access Authentication
50%
Activity-centric Access Control
50%
Administrative Model
50%
Attribute-aware
50%
CAPTCHA
50%
CAPTCHA Security
25%
CAPTCHA Usability
25%
Certificate-based
25%
ChaCha20
25%
Computing Assessment
50%
Computing Design
50%
Control Activities
50%
Creation Strategy
25%
Cross-site
25%
Cryptographic Algorithms
50%
Cryptographic Operations
25%
Cryptographic Solutions
25%
Design Assessment
50%
Detecting Location
50%
Dictionary Attack
25%
Distributed Learning
50%
Guessing Attack
25%
Hands-on Lab
50%
Homomorphic Encryption
50%
Impact Graph
50%
Inter-vehicle Communication
50%
Location Spoofing
50%
Mission Assurance
50%
Mission Impact
50%
Open Collaboration
50%
OpenVPN
50%
Passphrase
50%
Password Change
25%
Password Guessing
25%
Password Security
25%
Peer-to-peer Exchange
25%
Pronounceability
50%
Provenance-aware
50%
Relationship-based Access Control
50%
Rule Derivation
25%
Social Computing
50%
Social Computing Systems
50%
Spoofing Attack Detection
25%
Syscalls
50%
System Call Sequence
50%
Third-party Applications
50%
Twofish
25%
User-experts
25%
Weak Password
25%
WireGuard
50%
Computer Science
Access Control
100%
Advanced Encryption Standard
12%
Assessment Design
50%
Authentication
50%
Authoritative Server
25%
Authorization Policy
7%
Automated Test
25%
CAPTCHA
50%
Communication Network
10%
Communication Overhead
10%
Control Activity
75%
Control Framework
12%
Cryptographic Algorithm
50%
Cryptographic Operation
25%
Data Provenance
10%
Develop Solution
50%
Distributed Learning
50%
eBay
25%
Expressive Power
10%
Form Relationship
10%
Grained Control
7%
Graphical Model
25%
Integrity Constraint
7%
Intelligent Transportation System
10%
Learning Community
10%
Location Information
10%
Malicious Activity
10%
Mission Assurance
50%
Modern Operating System
10%
Multicore
25%
Multiple Relationship
10%
Negative Experience
16%
Online Social Networks
50%
Party Application
50%
Passphrase
50%
Physical Layer
10%
Programming Language Feature
10%
Relationship Type
10%
Research Frontier
7%
Role-Based Access Control
7%
Security and Privacy
50%
Session Management
7%
Social Computing
50%
Spoofing Attack
50%
System Activity
7%
Vehicle-to-Vehicle Communication
25%
Vehicular Communication
60%
Vehicular Network
50%
Virtual Private Network
50%
World Application
50%