index - Equipe Cybersécurité et Cryptographie Accéder directement au contenu

Dernières publications

Mots clés

Finite fields Communication V2X Dynamic attack graph WSN Cybersecurity Cybersécurité Hardware Decision Problems Internet of things IoT Physical unclonable function Software Risk assessment Integrity Named Data Networking HIP Machine learning Access Control Dynamic system Misbehavior Detection Classification algorithms Complexity theory Blockchains Graph Theory Microcontrollers Boolean Satisfiability Problems NP-completeness Program processors Industry Cloud Computing Bridge IoT Arabic Natural Language Processing Computer architecture CAM Identifying Codes Polynomial Reduction User-Centric Identity Identifying codes Symmetric difference distance Complexity Internet Bent Uniqueness of Solution Privacy Security Dataset PKI Industries Apprentissage automatique HSM Wireless communication Internet of Things Equivalence relations Algorithm Resistance Authentication Attack graph Virtualization and Cloud Computing Dominating codes Complexité OPC UA Connected vehicles Classification Hardness Demi-treillis à médianes C-ITS Graph Clustering Secure Elements Ethereum Graph theory Functional Encryption Lattice-Based Cryptography Combinatorial optimization OpenID Servers Certificate request Protocols Vehicular networks Internet of Things IoT Twin-Free Graphs Simulation Complexity Theory Costs Countermeasure ETSI Blockchain Anomaly detection Machine Learning Computer crime Certificate-less PKI Certificate Domination Cryptography Data centers Sécurité Actuators Industrial Environment Access control Information dissemination

 

 

Publications avec texte intégral

130

Références bibliographiques

499

Open access

29 %

 

Collaborations par pays