index - Equipe Cybersécurité et Cryptographie Accéder directement au contenu

Dernières publications

Mots clés

Privacy Industry Algorithm Sécurité Misbehavior Detection CAM Authentication Cybersecurity Apprentissage automatique Demi-treillis à médianes Classification Communication V2X Bridge Data centers Complexity Physical unclonable function Security Software Industries IoT Blockchains Certificate HIP Vehicular networks Named Data Networking Dataset Blockchain Industrial Environment Cybersécurité Graph theory Decision Problems Ethereum Polynomial Reduction Actuators Simulation Combinatorial optimization Computer architecture Microcontrollers PKI Dynamic system NP-completeness Classification algorithms Complexity Theory Internet Access Control Protocols Countermeasure Uniqueness of Solution Internet of Things IoT Hardness C-ITS Program processors HSM Complexité Connected vehicles OpenID Equivalence relations ETSI Certificate-less PKI Internet of things IoT Costs Machine Learning Certificate request Cryptography Dynamic attack graph Secure Elements Symmetric difference distance Boolean Satisfiability Problems Hardware Finite fields Virtualization and Cloud Computing Graph Cloud Computing User-Centric Identity Bent Clustering Identifying Codes Lattice-Based Cryptography Dominating codes Arabic Natural Language Processing Risk assessment Anomaly detection Twin-Free Graphs Access control Complexity theory Wireless communication Resistance OPC UA Attack graph Information dissemination Computer crime Domination Integrity WSN Machine learning Identifying codes Internet of Things Functional Encryption Servers Graph Theory

 

 

Publications avec texte intégral

129

Références bibliographiques

499

Open access

29 %

 

Collaborations par pays