Keyphrases
Lightweight Authentication
100%
Internet of Drones
100%
Drone
71%
Private Information
28%
Communication Cost
28%
Computing Power
14%
Conventional Tools
14%
Security Analysis
14%
Public Places
14%
Physical Security
14%
Computation Cost
14%
Public Safety
14%
Map Search
14%
Adversary
14%
Military Applications
14%
Safety Monitoring
14%
UAV
14%
Resource-constrained Devices
14%
Computing Cost
14%
Formal Security
14%
Lightweight Computation
14%
Unauthorized User
14%
Capture Attacks
14%
National Map
14%
Tampering Attack
14%
Known Attacks
14%
Robust Security
14%
Popular
14%
Delicate Balance
14%
ROR Model
14%
Key Agreement Scheme
14%
Lightweight Communication
14%
AVISPA
14%
Drone Communication
14%
Physical Capture
14%
Security Validation
14%
Computer Science
Communication Cost
100%
Authentication Protocol
100%
Application Scenario
50%
Security Analysis
50%
Constrained Device
50%
Computation Cost
50%
Authentication
50%
Physical Security
50%
Unauthorized User
50%
Computing Power
50%
Unmanned Aerial Vehicle
50%