Top keywords in security & privacy 1–100 of 13,638 results
Keywords Publications Citations  
1
Public Key 1852 44960
2
Access Control 2400 34254
3
Intrusion Detection 1577 31807
4
public key cryptosystem 700 31784
5
Digital Signature 993 29757
6
Signature Scheme 1179 28805
7
Provable Security 1235 28532
8
Cryptographic Protocol 927 26993
9
Elliptic Curve 1046 25611
10
Random Oracle Model 845 24585
11
Satisfiability 1636 22076
12
Security Policy 1164 21766
13
Hash Function 1142 19290
14
Block Cipher 1188 18892
15
Key Distribution 439 18098
16
Intrusion Detection System 1074 17727
17
Role Based Access Control 638 17333
18
Security Protocol 1035 16995
19
Smart Card 907 16732
20
Computer Security 1194 16502
21
Discrete Logarithm 491 15313
22
Operating System 941 15120
23
Distributed System 728 15029
24
Public Key Encryption 587 14869
25
Security Properties 811 13426
26
Key Management 546 13097
27
Public Key Cryptography 594 12856
28
Authentication Protocol 602 12789
29
Random Oracle 549 12660
30
Network Security 1061 12582
31
diffie hellman 478 12130
32
Key Exchange 503 11893
33
Security Model 801 11192
34
Information Flow 578 10976
35
Finite Field 630 10627
36
Zero Knowledge 449 10458
37
Indexing Terms 656 10306
38
Sensor Network 492 10265
39
Zero Knowledge Proof 333 9945
40
Large Scale 708 9841
41
Real Time 831 9837
42
Security Requirements 830 9796
43
Chosen Ciphertext Attack 299 9546
44
One-way Function 335 9515
45
Stream Cipher 745 9447
46
Anomaly Detection 523 9431
47
Denial of Service 423 9298
48
Case Study 955 9000
49
Identity Based Encryption 301 8845
50
Secure Computation 352 8785
51
Security Analysis 634 8604
52
Electronic Mail 135 8604
53
Trust Management 370 8234
54
IT Security 735 8233
55
Applied Cryptography 57 8188
56
Fault Tolerant 603 8168
57
Standard Model 522 7981
58
Oblivious Transfer 327 7884
59
Information Security 1396 7849
60
Sensor Nodes 264 7711
61
Access Control Policy 528 7694
62
Distributed Computing 243 7575
63
Secure System 609 7487
64
Source Code 314 7449
65
False Positive 379 7369
66
Lower Bound 538 7173
67
Network Traffic 398 7028
68
Secret Sharing 477 6908
69
chosen-ciphertext security 165 6823
70
Design and Implementation 478 6797
71
Key Establishment 206 6796
72
Group Signature 275 6764
73
Polynomial Time 288 6755
74
Data Encryption Standard 137 6730
75
Bilinear Map 186 6611
76
Discrete Logarithm Problem 293 6578
77
Computer Network 400 6487
78
Prime Number 86 6476
79
elliptic curve cryptosystem 289 6438
80
Digital Signature Scheme 285 6397
81
Secure Communication 475 6379
82
Electronic Funds Transfer 29 6352
83
Public Key Infrastructure 431 6311
84
Weil Pairing 69 6277
85
Information Theoretic 337 6161
86
Tamper Resistance 237 6046
87
Denial of Service Attack 316 5898
88
Traffic Analysis 178 5711
89
Key Agreement 296 5681
90
Building Block 439 5657
91
Side Channel Attacks 524 5611
92
High Speed 355 5574
93
Security Architecture 373 5548
94
Security and Privacy 549 5460
95
Rfid Tag 355 5418
96
Data Mining 449 5362
97
Blind Signature 254 5322
98
Information System 741 5258
99
Security Proof 427 5249
100
Power Analysis 231 5145