Computer Science
Homomorphic Encryption
100%
Encryption Scheme
100%
Building-Blocks
100%
Signature Scheme
100%
linear-feedback shift register
100%
Stream Cipher
100%
Microarray Data
50%
Distributed Computation
50%
Ciphertext
50%
Security Analysis
50%
Feature Selection
50%
Minimum Redundancy
50%
Partial Signature
50%
public key
50%
authenticated key agreement
50%
Encrypted Value
50%
Key Management
50%
Wireless Networks
50%
Authentication Factor
50%
identity based encryption
50%
Biometrics
50%
Paramount Importance
50%
Random Number Generation
50%
Random Number Generator
50%
provably secure
50%
Security Implication
50%
Output Function
50%
Cryptographic Primitive
50%
Long Term Evolution
50%
Initial Value
50%
Mobile Security
50%
Mobile Network
50%
Feature Extraction
50%
Advanced Encryption Standard
50%
Security Requirements
26%
Mutual Information
25%
Benchmarking
25%
Supervised Learning
25%
Effective Information
25%
Network Inference
25%
Behavioral Approach
25%
Response Protocol
25%
Initial Vector
25%
Statistical Model
25%
Experimental Result
25%
Automated Tool
16%
Computer Hardware
16%
Keying Material
16%
Key Generation
16%
Symmetric Encryption Algorithm
16%