index - Equipe Cybersécurité et Cryptographie Accéder directement au contenu

Dernières publications

Mots clés

Protocols Anomaly detection Hardness Vehicular networks HIP Complexité ETSI Hardware NP-completeness Machine Learning Security Uniqueness of Solution Access Control Dynamic attack graph Simulation Communication V2X Internet of Things IoT Graph Identifying Codes Named Data Networking Combinatorial optimization Machine learning Secure Elements Risk assessment User-Centric Identity Identifying codes Program processors Blockchains Computer crime Complexity theory Resistance Bent Internet of Things Bridge Sécurité Costs Physical unclonable function Cryptographic accumulators Microcontrollers Actuators Software Attack graph Boolean Satisfiability Problems Wireless communication Classification algorithms Certificate C-ITS Privacy Certificate-less PKI Finite fields Industry Dual pairing vector spaces Complexity Servers Integrity Domination PKI CAM Virtualization and Cloud Computing Computer architecture Apprentissage automatique Cybersécurité Ethereum Functional Encryption Cybersecurity Internet Dataset OpenID Clustering Countermeasure Certificate request OPC UA Blockchain Graph theory Arabic Natural Language Processing Twin-Free Graphs Authentication WSN Complexity Theory Symmetric difference distance Cryptography Industries Decision Problems Dominating codes Dynamic system Industrial Environment Demi-treillis à médianes Connected vehicles Algorithm Access control Misbehavior Detection Data centers Polynomial Reduction Information dissemination Graph Theory Classification Equivalence relations IoT Cloud Computing HSM

 

 

Publications avec texte intégral

133

Références bibliographiques

502

Open access

29 %

 

Collaborations par pays