index - Equipe Cybersécurité et Cryptographie Accéder directement au contenu

Dernières publications

Chargement de la page

Mots clés

Internet of Things Hardness Clustering Protocols Security Ethereum Complexity Simulation Identifying codes Equivalence relations Information dissemination Actuators Machine Learning Graph OpenID Sécurité Hardware Certificate Polynomial Reduction Software PKI Resistance Costs Virtualization and Cloud Computing Cloud Computing Computer architecture Servers Machine learning Internet of Things IoT Dominating codes Access Control Attack graph Integrity Connected vehicles Dataset Blockchains Certificate-less PKI Graph Theory Demi-treillis à médianes Symmetric difference distance Physical unclonable function Communication V2X Domination Internet of things IoT Anomaly detection Authentication Computer crime Decision Problems Internet Complexity theory Complexité Secure Elements CAM Cybersécurité Dynamic system IoT Bridge Microcontrollers OPC UA Cybersecurity Industries Classification HSM Vehicular networks Access control Finite fields NP-completeness Apprentissage automatique Identifying Codes Wireless communication Algorithm HIP Countermeasure Risk assessment Data centers Cryptography Complexity Theory Functional Encryption User-Centric Identity Industrial Environment Dynamic attack graph ETSI WSN Graph theory Twin-Free Graphs Blockchain Industry Lattice-Based Cryptography Program processors C-ITS Arabic Natural Language Processing Privacy Combinatorial optimization Boolean Satisfiability Problems Certificate request Classification algorithms Named Data Networking Misbehavior Detection Bent Uniqueness of Solution

 

 

Publications avec texte intégral

122

Références bibliographiques

492

Open access

28 %

 

Collaborations par pays