Keyphrases
Access Control Model
12%
Assure
12%
Authentication Mechanism
37%
Authentication Performance
12%
Authentication Protocol
100%
Blockchain
12%
Blockchain-based
100%
Centralized Approach
12%
Cluster-based
12%
Complexity Computation
12%
Controller
25%
Distributed Authentication
25%
Distributed Clustering
100%
Formal Proof
12%
General Attack
12%
Ground Station
25%
High Complexity
12%
High Mobility
12%
Identity Authentication
12%
Informal Proof
12%
Intelligent Approach
12%
Intelligent Clustering
100%
K-means
12%
Location-based
12%
Mutual Authentication
12%
Network Performance
12%
Physical Unclonable Function
12%
Security Analysis
12%
Single Point of Failure
12%
Smart Contract
12%
UAV
100%
Unified System
12%
Unmanned Aerial Vehicle (UAV) Communication
12%
Unmanned Aerial Vehicle Swarm
100%
Untrusted Environment
12%
Vehicle Authentication
37%
Wireless Communication
12%
Computer Science
Access Control Policy
8%
Authentication
16%
Authentication Information
8%
Authentication Mechanism
25%
Authentication Protocol
100%
Blockchain
100%
Centralized Approach
8%
Computation Complexity
8%
K-Means Clustering
8%
Mutual Authentication
8%
Network Performance
8%
Security Analysis
8%
Single Point of Failure
8%
Smart Contract
8%
Unmanned Aerial Vehicle
100%
Untrusted Environment
8%
Wireless Communication
8%