Keyphrases
Security Protocols
92%
Formal Verification
83%
Real-time Systems
76%
Radio Frequency Identification
61%
Schedulability Analysis
56%
Formal Modeling
49%
Resource Sharing
46%
Software-defined Networking
41%
Security Analysis
40%
Smart Card
40%
State Diagram
37%
Formal Methods
36%
Radio Frequency Identification System
36%
Process Algebra
35%
Formal Specification
33%
Radio Frequency Identification Tag
32%
CASPER
32%
Resource Base
30%
Vulnerability
29%
Security Threats
26%
Embedded Systems
25%
Identity Authentication
25%
UPPAAL
24%
Security Properties
24%
RFID System
23%
Ubiquitous Computing
23%
Model Biomembranes
23%
Algebraic Approach
23%
Spin-lattice Relaxation
21%
Wireless Networks
21%
Systems-based
21%
Key Exchange Protocol
20%
Model Checking Tools
20%
Divergence
19%
Secure Communication
19%
Security Privacy
19%
Network Interface Card
18%
Chain Molecules
17%
Nuclear Magnetic Resonance
17%
Authentication Protocol
17%
Replacement Policy
17%
Known Attacks
17%
Real-time Embedded Systems
17%
Real-time Property
17%
Mutual Authentication
17%
Superscalar Processor
16%
Phase Transition
16%
1H nuclear Magnetic Resonance (1H NMR)
16%
User Privacy
15%
Internet TV
15%
Computer Science
Real Time Systems
100%
Security protocols
82%
Formal Verification
81%
Model Checking
77%
Schedulability Analysis
67%
Radio Frequency Identification
61%
Formal Specification
52%
formal modeling
49%
Shared Resource
46%
Process Algebra
45%
Statecharts
43%
Authentication
42%
Smart Card
40%
Software-Defined Networking
34%
Embedded Systems
30%
Secure Communication
26%
Ubiquitous Computing
25%
Embedded Software
25%
Case Study
23%
Network Interface Card
23%
Replacement Policy
23%
Evaluation Models
23%
Cybersecurity
23%
Smart Contract
23%
Wireless Networks
21%
Mutual Authentication
20%
authentication scheme
20%
Key Exchange Protocol
20%
Performance Evaluation
19%
Network Environment
19%
Security Analysis
17%
Security Properties
17%
Computer Hardware
16%
Authentication Protocol
16%
Superscalar Processor
16%
Security and Privacy
16%
Equivalence Checking
15%
Trading System
15%
Electronic Payment
15%
Firewall Application
15%
Internet Protocol Television
15%
Recognition System
15%
Face Recognition
15%
Set-Top Box
15%
Timing Analysis
15%
Access Control
15%
Vulnerability Assessment
15%
Machine Learning Algorithm
15%
Distributed Network
15%
Managed Network
15%