index - Equipe Cybersécurité et Cryptographie Accéder directement au contenu

Dernières publications

Mots clés

Wireless communication Privacy Costs Decision Problems Industrial Environment Industries Servers Functional Encryption Cybersécurité Cloud Computing Computer crime Access Control Demi-treillis à médianes Simulation Complexity Theory Complexity Physical unclonable function Classification Software Risk assessment Apprentissage automatique Internet of Things Dynamic system Blockchain Actuators Hardness Identifying codes IoT Authentication OpenID Microcontrollers Secure Elements Dynamic attack graph Integrity Virtualization and Cloud Computing Dominating codes Vehicular networks Program processors Internet Resistance Industry Uniqueness of Solution Blockchains Equivalence relations Cryptographic accumulators Twin-Free Graphs Named Data Networking Information dissemination Anomaly detection Boolean Satisfiability Problems Cybersecurity Combinatorial optimization Communication V2X Domination Access control Certificate-less PKI Countermeasure Bent Certificate Ethereum Security Classification algorithms OPC UA Data centers Certificate request Polynomial Reduction Complexity theory Machine Learning Connected vehicles Hardware Identifying Codes Clustering NP-completeness Dataset WSN User-Centric Identity ETSI Graph CAM Computer architecture C-ITS Symmetric difference distance HIP HSM Algorithm Arabic Natural Language Processing PKI Attack graph Graph Theory Machine learning Dual pairing vector spaces Protocols Graph theory Sécurité Cryptography Misbehavior Detection Complexité Finite fields Bridge Internet of Things IoT

 

 

Publications avec texte intégral

134

Références bibliographiques

501

Open access

29 %

 

Collaborations par pays