index - Equipe Cybersécurité et Cryptographie Accéder directement au contenu

Dernières publications

Mots clés

Industries Clustering Finite fields C-ITS HSM Uniqueness of Solution Cryptography Wireless communication Apprentissage automatique Misbehavior Detection Industrial Environment Graph Theory Complexity Ethereum Lattice-Based Cryptography Decision Problems Access control Twin-Free Graphs Connected vehicles CAM Identifying Codes Certificate-less PKI Machine learning Internet of Things Dataset Communication V2X Certificate request Access Control Blockchain User-Centric Identity Virtualization and Cloud Computing Internet of Things IoT Cybersécurité Secure Elements Functional Encryption Costs Dynamic system Complexity theory Cybersecurity Dynamic attack graph Domination Cloud Computing Arabic Natural Language Processing Certificate Classification algorithms NP-completeness OpenID OPC UA Microcontrollers Classification Countermeasure Anomaly detection Servers Boolean Satisfiability Problems ETSI Privacy Actuators Algorithm Sécurité Complexité Equivalence relations Symmetric difference distance Blockchains WSN PKI Attack graph Hardness Dominating codes Software Information dissemination Simulation Identifying codes Authentication Bent Machine Learning Vehicular networks Demi-treillis à médianes Combinatorial optimization Named Data Networking Internet Complexity Theory Protocols Computer architecture Physical unclonable function Computer crime Security Data centers Bridge Program processors Graph theory Risk assessment Graph Internet of things IoT Hardware Polynomial Reduction Resistance Integrity HIP IoT Industry

 

 

Publications avec texte intégral

122

Références bibliographiques

492

Open access

28 %

 

Collaborations par pays