Computer Science
Credentials
100%
Energy Efficient
100%
Authentication Protocol
100%
Internet
100%
User
50%
Prevents
50%
Authentication
50%
Information Leakage
25%
Unauthorized User
25%
Internet Security
25%
Security Application
25%
Security Analysis
25%
Security protocols
25%
Attack
25%
Multiple Data Type
25%
Authenticated User
25%
Constrained Device
25%
Internet of Vehicles
25%
Communication Cost
25%
Privacy Leakage
25%
Data Type
25%
INIS
internet
100%
drone
100%
authentication
100%
energy
100%
data
66%
security
44%
solutions
33%
applications
22%
leakage
22%
vehicles
11%
simulation
11%
calculation methods
11%
information
11%
resources
11%
energy costs
11%
randomness
11%
devices
11%
cost
11%
tools
11%
validation
11%
additives
11%