INIS
design
100%
cryptography
100%
security
100%
investigations
100%
learning
100%
algorithms
80%
environment
60%
vulnerability
40%
operation
40%
applications
40%
leakage
40%
devices
40%
data
40%
electronic equipment
40%
control
20%
electromagnetic radiation
20%
automobiles
20%
flexibility
20%
internet
20%
mobile phones
20%
power
20%
indicators
20%
risks
20%
hybrids
20%
range
20%
personal computers
20%
information
20%
modifications
20%
masking
20%
implementation
20%
performance
20%
alignment
20%
sensors
20%
Computer Science
Deep Learning
100%
Security Systems
100%
side-channel
100%
Participatory Design
100%
Cryptographic Algorithm
57%
Execution Environments
42%
Vulnerability
28%
Critical Operation
28%
Attackers
28%
Countermeasures
28%
Alignment Requirement
14%
Decryption
14%
Information Leakage
14%
Physical Device
14%
Optimal Performance
14%
Roles
14%
Data Confidentiality
14%
Access Restriction
14%
Personal Computer
14%
Power Consumption
14%
Security Measure
14%
Sensitive Application
14%
Digital Signature
14%
Application
14%
Attack
14%
Prevents
14%
Electronic System
14%
Hashing
14%
Encryption
14%
Internet of Things
14%
Smart Card
14%
Data Access Control
14%
Keyphrases
Hiding Techniques
16%
Secure Enclaves
16%
Wearable Gadgets
16%