index - Equipe Cybersécurité et Cryptographie Accéder directement au contenu

Dernières publications

Mots clés

Resistance C-ITS Software Graph theory Algorithm Actuators Blockchain CAM Dominating codes Ethereum Identifying Codes Polynomial Reduction Microcontrollers Complexity Theory Dynamic system Decision Problems Communication V2X Classification algorithms Secure Elements Bent Blockchains Anomaly detection User-Centric Identity Access control Machine Learning Combinatorial optimization Classification Attack graph OPC UA IoT Vehicular networks Misbehavior Detection Internet Dynamic attack graph Sécurité Clustering Privacy Complexity Data centers Demi-treillis à médianes Graph HSM Costs Integrity Authentication Bridge Dataset Protocols Complexity theory Finite fields Cloud Computing Lattice-Based Cryptography Internet of things IoT Industrial Environment Wireless communication Security Connected vehicles Arabic Natural Language Processing Complexité Functional Encryption Simulation Certificate-less PKI Hardware Named Data Networking WSN Access Control PKI Identifying codes Countermeasure Machine learning Cryptography ETSI Internet of Things Symmetric difference distance Certificate Graph Theory Physical unclonable function OpenID Servers Virtualization and Cloud Computing Boolean Satisfiability Problems Hardness Risk assessment Twin-Free Graphs Apprentissage automatique Domination Internet of Things IoT Equivalence relations Cybersecurity Program processors Certificate request HIP Cybersécurité Information dissemination Uniqueness of Solution Computer crime Computer architecture Industries Industry NP-completeness

 

 

Publications avec texte intégral

119

Références bibliographiques

491

Open access

28 %

 

Collaborations par pays