Keyphrases
Activity-centric Access Control
66%
Administrative Model
66%
Attribute-aware
66%
CAPTCHA
66%
CAPTCHA Security
33%
CAPTCHA Usability
33%
Certificate-based
33%
ChaCha20
33%
Computing Assessment
66%
Computing Design
66%
Control Activities
66%
Creation Strategy
33%
Cross-site
33%
Cryptographic Algorithms
66%
Cryptographic Operations
33%
Cryptographic Solutions
33%
Design Assessment
66%
Detecting Location
66%
Dictionary Attack
33%
Distributed Learning
66%
Guessing Attack
33%
Hands-on Lab
66%
Homomorphic Encryption
66%
Impact Graph
66%
Inter-vehicle Communication
66%
Location Spoofing
66%
Mission Assurance
66%
Mission Impact
66%
Open Collaboration
66%
OpenVPN
66%
Passphrase
66%
Password Change
33%
Password Guessing
33%
Password Security
33%
Peer-to-peer Exchange
33%
Pronounceability
66%
Provenance-aware
66%
Recurrent Neural Network Model
26%
Relationship-based Access Control
66%
Rule Derivation
33%
Social Computing
66%
Social Computing Systems
66%
Spoofing Attack Detection
33%
Syscalls
66%
System Call Sequence
66%
Third-party Applications
66%
Twofish
33%
User-experts
33%
Weak Password
33%
WireGuard
66%
Computer Science
Access Control
66%
Advanced Encryption Standard
16%
Assessment Design
66%
Authoritative Server
33%
Authorization Policy
9%
Automated Test
33%
CAPTCHA
66%
Communication Network
13%
Communication Overhead
13%
Comprehensive Coverage
8%
Control Activity
100%
Control Framework
16%
Cryptographic Algorithm
66%
Cryptographic Operation
33%
Data Provenance
13%
Distributed Learning
66%
eBay
33%
Expressive Power
13%
Form Relationship
13%
Grained Control
9%
Graphical Model
33%
Integrity Constraint
9%
Intelligent Transportation System
13%
Iterative Development
8%
Learning Community
13%
Location Information
13%
Malicious Activity
13%
Mission Assurance
66%
Modern Operating System
13%
Multicore
33%
Multiple Relationship
13%
Negative Experience
22%
Online Social Networks
66%
Party Application
66%
Passphrase
66%
Physical Layer
13%
Programming Language Feature
13%
Relationship Type
13%
Research Frontier
9%
Role-Based Access Control
9%
Satisfaction Rating
8%
Sensitive User Data
9%
Session Management
9%
Social Computing
66%
Spoofing Attack
66%
System Activity
9%
Vehicle-to-Vehicle Communication
33%
Vehicular Communication
80%
Vehicular Network
66%
Virtual Private Network
66%