Computer Science
Attack
100%
deduplication
100%
Personal Identification Number
100%
group signature
100%
Plaintext
100%
Usage Statistic
100%
Systems and Application
50%
Internet Protocol
50%
Gigabit Ethernet
50%
Wireless Sensor Node
50%
Ciphertext
40%
Privacy Property
25%
Authentication Protocol
25%
Internet Standard
25%
Mutual Authentication
25%
Security Properties
25%
Detection Mechanism
22%
User Privacy
20%
Security and Privacy
20%
Physical Page
20%
side-channel
20%
Private Environment
20%
Focused Research
20%
Encryption
20%
Information Leakage
20%
Message
20%
Advanced Encryption Standard
20%
Javascript Code
20%
Instantiation
20%
Control Application
20%
Access Control
20%
Android
20%
Algorithms
20%
Secret Information
18%
Hardware Implementation
16%
Network Condition
16%
Traffic Analysis
16%
Anonymity Network
16%
Training Phase
16%
Client-Side Attack
16%
Political Interest
16%
Defense Mechanism
16%
Privacy Threat
16%
Personal Detail
16%
Routers
16%
Timing Information
14%
Sophisticated Attack
14%
Testbed
14%
Cache Line Size
14%
Hardware Performance
11%
Benign Application
11%
Constant Cache
11%
Performance Counter
11%
Automated Attack
9%
Information System
9%
Data Access
9%
Attack Technique
9%
linux system
9%
Powerful Source
9%
Linux
9%
Vulnerability
9%
Instruction Execution
9%
Engineering
Input Multiple
100%
Using Sensor
100%
Radio Frequency Identification Reader
100%
Phase Difference
60%
Localization Accuracy
20%
Software Defined Radio
20%
Anechoic Chamber
20%
Radio Channel
20%
Hardware Component
20%
Antenna Configuration
20%