index - Equipe Cybersécurité et Cryptographie

Dernières publications

Mots clés

Twin-Free Graphs Demi-treillis à médianes Servers Internet of Things Protocols Graph theory Ethereum Internet Symmetric difference distance Costs WSN Cryptanalysis and other attacks C-ITS Equivalence relations Classification Actuators Arabic Natural Language Processing Combinatorial optimization OPC UA Complexity theory Countermeasure Cloud Computing Decision Problems Communication V2X OpenID Connected vehicles CAM Sécurité Polynomial Reduction Data centers Internet of Things IoT Simulation Cybersecurity Attack graph Access Control Complexity Cryptography Boolean Satisfiability Problems IoT Complexity Theory Misbehavior Detection Classification algorithms Identifying Codes ETSI Virtualization and Cloud Computing Graph Theory Digital signatures Cybersécurité Risk assessment Adaptation models Resistance Access control Anomaly detection User-Centric Identity Cryptographic accumulators Block and stream ciphers Certificate PKI Microcontrollers Uniqueness of Solution Algorithm Apprentissage automatique Certificate-less PKI Secure Elements Domination Security and privacy Wireless communication Physical unclonable function Security Dataset Delays Machine Learning Named Data Networking Industrial Environment Software Blockchains Strong solutions Entropy Vehicular networks Dominating codes Program processors Bridge Hardware Privacy Identifying codes Industry NP-completeness Data security Network security Blockchain Symmetric cryptography Complexité Clustering Computer architecture Bent HIP Machine learning Computer crime Authentication Certificate request

 

 

Publications avec texte intégral

138

Références bibliographiques

508

Open access

29 %

 

Collaborations par pays