Computer Science
Android
100%
group signature
100%
Control Application
100%
Access Control
100%
Advanced Encryption Standard
100%
Usage Statistic
100%
Secret Information
100%
deduplication
100%
Detection Mechanism
100%
Experimental Result
100%
forgery attack
100%
Personal Identification Number
100%
side-channel
100%
Gigabit Ethernet
50%
Automated Attack
50%
Powerful Source
50%
Data Access
50%
Performance Counter
50%
linux system
50%
Training Phase
50%
Internet Protocol
50%
Information System
50%
Network Condition
50%
Constant Cache
50%
Attack Technique
50%
Political Interest
50%
Privacy Threat
50%
Benign Application
50%
Instruction Execution
50%
Personal Detail
50%
Hardware Performance
50%
Client-Side Attack
50%
Anonymity Network
50%
Traffic Analysis
50%
Security Analysis
50%
Hardware Implementation
50%
Serial Implementation
50%
Special Attention
50%
Systems and Application
50%
Phase Difference
50%
Wireless Sensor Node
50%
Ciphertext
40%
Cache Line Size
33%
Testbed
33%
Timing Information
33%
Sophisticated Attack
33%
Physical Page
33%
Private Environment
33%
Javascript Code
33%
Encryption
33%
Mutual Authentication
25%
Security Properties
25%
Authentication Protocol
25%
Privacy Property
25%
Instantiation
20%
Focused Research
20%
Information Leakage
20%
User Privacy
20%
Software Defined Radio
16%
Engineering
Radio Frequency Identification Reader
100%
Input Multiple
100%
Ciphertext
100%
Frequency Multiplier
100%
Harmonics
100%
Mixers (Machinery)
100%
Network Analyzer
100%
Conducted Measurement
100%
Phase Difference
60%
Localization Accuracy
20%
Radio Channel
20%
Software Defined Radio
20%
Anechoic Chamber
20%