Keyphrases
Attack Probability
33%
Attacker
33%
Content-specific
33%
Data Content
33%
Decrypt
33%
Decryption
33%
Encryption Algorithm
33%
Existing State
33%
Game Analysis
100%
Game Model
33%
Game-theoretic Security
33%
Hop Count
66%
Internet of Things
33%
Internet of Things Devices
33%
Internet of Things Networks
100%
IP Address
33%
Malicious Attacks
33%
Malicious Node
33%
Message Overhead
33%
Named Data Networking
100%
Network Scenarios
33%
Network Security
33%
Nonoperative
33%
Payoff
33%
Physical Devices
33%
Privacy Loss
33%
Privacy Security
33%
Private Key
33%
Process Data
33%
Public Key
33%
Public Key Encryption
33%
Robust Security
33%
Security Breaches
33%
Security Scheme
100%
Security Solutions
33%
Sender
100%
Service-oriented
100%
Stackelberg Game
33%
Time Complexity
33%
World Wide Web
66%
Computer Science
Attack Probability
33%
Attackers
33%
Collecting Data
33%
Decryption
33%
Encryption Technique
33%
Internet of Things
100%
Internet of Things Device
33%
Malicious Attack
33%
Network Scenario
33%
Network Security
33%
Physical Device
33%
Processing Data
33%
public key
33%
Public Key Encryption
33%
Security Breach
33%
Security Solution
33%
stackelberg game
33%
Theoretic Model
33%
Time Complexity
33%