Computer Science
Models
100%
Blockchain
94%
Auditing
39%
Functionality
39%
Bitcoin
36%
Application
36%
Computation
34%
User
33%
Generation
32%
Building-Blocks
27%
Consensus Protocol
26%
Bulletin Board
25%
Hash Function
23%
Elgamal Encryption
19%
Human Participant
19%
Procedures
19%
Additional Assumption
19%
Real World
19%
Reference String
19%
Web Application Firewall
19%
Cryptocurrency
19%
Encryption
19%
Password
19%
Automaton
19%
Outsourcing
19%
Integrated Circuit
19%
Secret Sharing
19%
Anonymity
19%
Server
19%
Sensitive Informations
17%
Public Key Encryption
16%
Communication
16%
Trojans
15%
Election Authority
15%
Classes
14%
Computational Power
14%
Security Properties
13%
Standards
13%
Specifications
13%
Metadata
13%
Design
13%
Stakeholders
13%
Precomputation
13%
Complexity
13%
Internet
12%
Programs
11%
Digital Signature
10%
Messages
10%
Snowden Revelation
9%
Argument
9%
Probability
9%
Functions
9%
Trained Participant
9%
Election Result
9%
Security Analysis
9%
Computer Science
9%
Communication Context
9%
Email Application
9%
Evaluation
9%
Simulated Data
9%
Threat Model
9%
Online Activity
9%
High Importance
9%
e-Mail
9%
Finite Automata
8%
Testing
8%
Messaging System
7%
Simulation
7%
Hardware
7%
Compiler
7%
Fabrication Process
7%
Public Key Infrastructure
6%
Secure Protocol
6%
Provide Security
6%
Security Parameter
6%
Key Generation
6%
Unpredictability
6%
Random Function
6%
Hashing
6%
Data Structure
6%
Underlying Assumption
6%
Codeword Length
6%
Authentication
6%
Nash Equilibrium
5%