Engineering & Materials Science
Authentication
100%
Mobile ad hoc networks
94%
Wireless sensor networks
88%
Sensor networks
65%
Sensor nodes
56%
Query processing
48%
Communication
44%
Network protocols
43%
Access control
31%
Mobile computing
30%
Ad hoc networks
30%
Radio frequency identification (RFID)
29%
Outsourcing
28%
Wireless mesh networks (WMN)
27%
Smartphones
24%
Wireless networks
23%
Crowdsourcing
23%
Jamming
22%
Physical layer
19%
Routing protocols
19%
Zigbee
19%
Internet of things
18%
Experiments
18%
Data storage equipment
18%
Servers
18%
Unattended sensors
18%
Location based services
17%
Data privacy
16%
Indoor positioning systems
16%
Costs
16%
Sensors
14%
Energy efficiency
14%
Botnet
13%
Touch screens
13%
Cryptography
12%
Internet
12%
Bluetooth
11%
Scalability
11%
Throughput
11%
Base stations
11%
Security of data
10%
Denial-of-service attack
10%
Dynamic loads
10%
Cognitive radio
10%
Network security
10%
Radio transmission
9%
Agglomeration
8%
Network layers
8%
Energy conservation
8%
Spamming
8%
Mathematics
Mobile Ad Hoc Networks
37%
Sensor Networks
21%
Authentication
18%
Privacy Preserving
17%
Vertex of a graph
16%
Attack
15%
Privacy
14%
Sensor
14%
Routing Protocol
11%
Query Processing
11%
Service Selection
10%
Vehicular Ad Hoc Networks
10%
Wireless Mesh Networks
10%
Receiver
10%
Access Control
10%
Spectrum Sensing
9%
Context-aware
9%
Reputation System
9%
Cognitive Radio
9%
Peer-to-peer Networks
8%
Navigation System
8%
Range Query
8%
Resources
8%
Jamming
7%
Query
7%
Identity-based
7%
Wireless Sensor Networks
7%
Maximal Ratio Combining
7%
Efficacy
6%
Energy Conservation
6%
Broadcast
6%
Routing
6%
Quality of Service
6%
Spread Spectrum
5%
Movement
5%
Energy
5%
Demand
5%
Communication
5%