INIS
devices
100%
applications
95%
security
70%
metrics
65%
implementation
50%
management
49%
data
49%
control
46%
cryptography
41%
computer codes
36%
environment
33%
cities
31%
surveillance
31%
taxonomy
31%
architecture
22%
manufacturers
19%
storage
18%
patents
17%
proposals
17%
protection
17%
risks
15%
metals
15%
life cycle
15%
business
15%
evaluation
15%
verification
15%
procurement
15%
water
15%
automation
14%
sensors
14%
resources
14%
control systems
12%
calculation methods
12%
information
12%
dynamics
10%
safety
10%
Keyphrases
Remote Attestation
46%
Identity Management
33%
Access Management
33%
Android Mobile Application
31%
Security Control
31%
Security Metrics
31%
Surveillance System
31%
City Scale
31%
Cryptosystem
31%
Secure Communication
23%
Communication Platform
23%
Security Goals
21%
Cryptographic
18%
OPC UA
17%
Factory of the Future
17%
Application Development
17%
Mobile Terminal
17%
Objective Control
15%
Mobile Trusted Module
15%
Distributed Surveillance System
15%
Risky Driving
15%
Kyber
15%
Bittium
15%
Experimental Implementation
15%
User Data
15%
Personal Data
15%
Airbus
15%
Resilient
15%
Houston
15%
Data Marketplace
15%
Public Key Infrastructure
15%
Management Requirements
15%
Metric Development
15%
Attestation
15%
Life Cycle Management
15%
Development Control
15%
Patent Application
15%
Future Environment
15%
Device Life
15%
Field Devices
15%
Water Management
15%
Combined System
15%
Wireless Application Protocol
15%
Module Base
15%
Procurement Process
15%
Embedded Systems
15%
Personal Data Protection
15%
Context Module
15%
Integrity Verification
15%
Secure Storage
15%
Computer Science
Identity and Access Management
34%
Secure Communication
31%
Android
31%
Smartphone Application
31%
Security Control
25%
Cryptographic System
25%
Target System
24%
Use Case
23%
Security Objective
21%
Industrial Automation
20%
Access Control
20%
Integrity Measurement
20%
Cryptography
18%
Critical Infrastructure
17%
Mobile Terminal
17%
Unified Communication
15%
Public Key Infrastructure
15%
Hardware Component
15%
Procurement Process
15%
Integrity Verification
15%
Protocol Architecture
15%
System Integrity
15%
Open Standard
15%
Personal Data Protection
15%
Security Breach
15%
Certificate Hierarchy
15%
Computation Node
15%
Revocation Certificate
15%
Synchronous Operation
15%
Access Control Policies
15%
Asynchronous Operation
15%
mobile service
15%
Sensor Node
15%
Organizational Structure
15%
Application Protocol
15%
Execution Environments
15%
Industrial Control System
15%
Device Manufacturer
15%
Personal Data
15%
Reconfiguration
15%
Application Development
15%
Digitalization
15%
Dynamic Reconfiguration
15%
User Data
15%
Embedded Systems
15%
Security Systems
15%
Secure Environment
15%
Constrained Device
15%
Security Challenge
15%
Cycle Management
15%