Engineering & Materials Science
Access control
20%
Application programs
39%
Authentication
19%
Automation
7%
Biomedical equipment
13%
Biometrics
18%
Blood
11%
Clocks
10%
Cloning
7%
Communication
11%
Computer debugging
17%
Computer hardware
46%
Control systems
11%
Costs
13%
Cryptography
100%
Data storage equipment
30%
Discriminant analysis
10%
Dynamic analysis
10%
Dynamic frequency scaling
7%
Electric potential
27%
Electric power utilization
22%
Embedded systems
32%
Energy utilization
20%
Field programmable gate arrays (FPGA)
15%
Firmware
58%
Glucose
21%
Interfaces (computer)
35%
Internet
12%
Internet of things
39%
Learning algorithms
7%
Linux
11%
Medical problems
6%
Microcontrollers
72%
Monitoring
10%
Network protocols
25%
Program processors
29%
Quantum cryptography
27%
Recovery
25%
Reduced instruction set computing
35%
Remote control
7%
Reverse engineering
37%
Sensors
7%
Side channel attack
78%
Sodium chloride
10%
Standardization
9%
Static analysis
7%
Supervised learning
10%
Transponders
42%
Ubiquitous computing
25%
Voltage scaling
35%
Mathematics
Access Control
7%
Attack
36%
Authentication
5%
Communication
11%
Communication Channels
5%
Comprehensive Evaluation
6%
Computing
5%
Confidence
5%
Countermeasures
7%
Cryptography
20%
Demonstrate
5%
Design
5%
Embedded Systems
7%
Emergency
5%
Energy Consumption
32%
Hardware
5%
Internet of Things
34%
Key Agreement
6%
Key Agreement Protocol
6%
Locking
6%
Microcontroller
15%
Multi-core Processor
33%
Object
6%
Open Source
5%
Pervasive Computing
9%
Radio Frequency Identification
6%
Resistance
5%
Resources
17%
Reverse Engineering
34%
Secure Communication
5%
Side Channel Attacks
14%
Side-channel Analysis
78%
Susceptibility
6%
Symmetric Cryptography
8%
Timing Attack
7%
Transmitter
5%
Vulnerability
5%
Wireless Communication
5%
Business & Economics
Attack
43%
Authentication
6%
Controller
21%
Countermeasures
9%
Cryptography
5%
Enclaves
57%
Encryption
6%
Fault
9%
Floating
21%
Hardware
8%
Injection
9%
Integrity
8%
Interface Management
29%
Leakage
13%
Management Power
7%
Microsoft
10%
Mitigation
5%
Open Source
5%
Polynomials
14%
Software
6%
Vulnerability
17%