Keyphrases
Internet of Things
82%
Capability-Based Access Control (CapBAC)
54%
Local Cloud
39%
Cloud Platform
38%
Access Control
37%
Secure Communication
19%
Access Control System
17%
Machine-to-machine
17%
Indonesia
16%
Security Behavior
15%
Access Control Scheme
15%
Congestion Control
15%
Deep Reinforcement Learning (deep RL)
15%
Cellular Networks
15%
Access Delegation
13%
Internet of Things Networks
10%
Government Efforts
10%
Smart Devices
9%
Elliptic Curve Cryptography
9%
Big Data Processing
9%
Internet of Healthcare Things (IoHT)
9%
Identity-based Cryptography
8%
Enterprise Systems
8%
Security Awareness
8%
Internet of Things Devices
8%
Access Control Model
7%
Low-power Devices
7%
Blockchain-based Electronic Voting
7%
Metamask
7%
Intrusion Detection Game
7%
Controlled Delegation
7%
Cross-platform Application
7%
Fine-grained Access Control
7%
Inter-enterprises
7%
RFID System
7%
EPCglobal
7%
Location Management
7%
Data-driven Modeling
7%
Positive Security
7%
Service Platform
7%
Service Environment
7%
Identity Authentication
7%
Admission Control
7%
Identity Establishment
7%
Everything as a Service
7%
Telemetry
7%
Bitcoin Transactions
7%
Viticulture
7%
Smart Contract
7%
Network Context
7%
Computer Science
Internet of Things
100%
Access Control
66%
Cloud Platform
38%
Authentication
18%
Key Management
17%
Machine to Machines
17%
Access Control System
15%
Access Control Schemes
15%
Congestion Control
15%
Deep Reinforcement Learning
15%
Blockchain
15%
Cellular Network
15%
Security Awareness
11%
Smart Device
9%
Big Data Processing
9%
identity-based cryptography
8%
Elliptic Curve
8%
Enterprise System
8%
Identity Theft
7%
Ethereum
7%
Grained Access Control
7%
Data Modeling
7%
Bitcoin
7%
Mobile App
7%
Android
7%
Service Platform
7%
Conceptual Model
7%
cloud system
7%
Platform a a Service
7%
Aging Population
7%
Home Environment
7%
Development Framework
7%
Smart Contract
7%
Least Squares Method
7%
Intrusion Detection
7%
Mobility Management
7%
context aware application
7%
Complex Situation
7%
5G
7%
Radio Frequency Identification
7%
Electronic Voting System
7%
Attackers
7%
Processing Time
7%
Health Care
7%
Security Incident
7%
Structural Equation
7%
Secure Communication
7%
Access Control Policies
6%
Access Rights
6%
Internet of Things Device
6%