INIS
security
100%
cryptography
48%
humans
43%
information
40%
data
40%
algorithms
35%
management
33%
implementation
30%
solutions
28%
performance
28%
control
26%
incidents
25%
devices
24%
applications
23%
assessments
23%
authentication
22%
communities
22%
europe
19%
distribution
18%
evaluation
18%
transport
17%
developers
16%
exercise
16%
water utilities
16%
quantum cryptography
16%
metrics
16%
levels
16%
risks
16%
environment
15%
computer codes
15%
education
15%
operation
15%
surveys
14%
units
14%
comparative evaluations
13%
industry
13%
reviews
13%
travel
13%
range
12%
tools
12%
interactions
12%
water
11%
cost
11%
people
10%
viruses
10%
taxonomy
10%
Keyphrases
Quantum-safe
25%
Critical Infrastructure
21%
Cybersecurity
17%
Cryptographic
16%
Water Utilities
16%
Token
15%
Digital Signature Algorithm
15%
Mobile Networks
13%
Intelligent Transportation Systems
13%
Cryptography
12%
Authentication Mechanism
12%
Communication Networks
12%
Human Senses
12%
Human Capabilities
12%
Systems-based
12%
Europe
11%
Attacker
11%
Infrastructure Companies
11%
Cascading Effects
11%
Impact Analysis
11%
Cyber
11%
BB84
10%
Computer Science
Cybersecurity
28%
Critical Infrastructure
25%
Digital Signature
24%
Blockchain
21%
Authentication
18%
Key Distribution
16%
Quantum Cryptography
16%
Quantum Algorithm
16%
Attackers
16%
Quantum Computer
15%
Mobile Network
14%
Communication Networks
12%
User Experience
12%
Digitalization
11%
Distributed Ledger Technology
11%
Impact Analysis
10%