Computer Science
Authentication
100%
Attack
93%
Algorithms
66%
User
51%
Error-correcting code
42%
Source Coding
39%
authentication scheme
39%
Trojans
34%
Data Compression
34%
Stream Cipher
34%
Security and Privacy
28%
Threat
28%
Message
27%
build-in self-test
25%
Message Authentication Code
25%
Computing
25%
Successful Attack
25%
Aliasing Probability
21%
Security protocols
17%
Vmware Workstation
17%
Vmware Player
17%
Cloud Computing
17%
Sensitive Traffic
17%
Security Awareness
17%
Authentication Group
17%
Digital Signature Scheme
17%
Cryptographic Protection
17%
Encryption Technology
17%
Irreducible Polynomial
17%
Consecutive Symbol
17%
Multiple Channel
17%
Shannon Theory
17%
Use Case
17%
M sequence
17%
Minimal Polynomial
17%
Public-Key Cryptosystems
17%
Obfuscation
17%
Visual Cryptography
17%
Practical Solution
17%
public key
17%
Identifier
17%
Data Security
17%
Coding Theory
17%
Telecommunication
17%
Augmented Reality
17%
Modeling
17%
Theoretic Approach
17%
Protection
15%
Service
14%
Software Complexity
11%
Mathematics
Polynomial
34%
Fast Correlation Attack
34%
Bounds
34%
Generator Sequence
25%
Number
24%
Prime Polynomial
17%
Escape Probability
17%
Partial Matching
17%
Linear Complexity
17%
Hash Function
17%
Authentication Code
14%
Coding Theory
11%
Linear Feedback Shift Register
11%
Feedback Polynomial
11%
Intractability
8%
Randomness
8%
Variance
8%
Necessary Condition
8%
Computed Value
5%
General Linear Group
5%
Concatenated Code
5%
Algebraic Curve
5%
Solomon Code
5%
Classical Group
5%
Engineering
Networks (Circuits)
34%
Zeros
22%
Secret Key
22%
Generators
21%
Estimator
17%
Electronic Devices
17%
Coding
17%
Built-in Self Test
17%
Recurrence Relation
17%
General Class
17%
Prediction
17%
Error
17%
Codes
15%
Data Value
11%
K Value
11%
Compactness
8%
Input Signal
8%
Illustrates
8%
Great Importance
8%
Guidelines
8%
Representative Set
8%
Redesign
5%
Elements
5%
Optimization
5%
Communication Protocol
5%