index - Equipe Cybersécurité et Cryptographie Accéder directement au contenu

Dernières publications

Mots clés

Certificate Cryptography Dynamic attack graph Lattice-Based Cryptography Data centers Bent Protocols Risk assessment Internet of things IoT Countermeasure Machine learning Blockchains Symmetric difference distance Arabic Natural Language Processing Blockchain C-ITS Demi-treillis à médianes Internet of Things IoT Named Data Networking Actuators Misbehavior Detection Linear order ETSI Complexity theory CAM User-Centric Identity Anomaly detection Hardware Classification algorithms Complexity Industries Information dissemination Connected vehicles Access control Access Control Industrial Environment Finite fields NP-completeness Virtualization and Cloud Computing Software Classification IoT Microcontrollers Apprentissage automatique Polynomial Reduction Cybersécurité Costs Internet PKI Industry Complexity Theory Vehicular networks Dynamic system Machine Learning Certificate request Decision Problems Graph Privacy Algorithm HSM Combinatorial optimization OPC UA HIP Uniqueness of Solution Twin-Free Graphs Authentication Bridge Identifying Codes Secure Elements Program processors OpenID Physical unclonable function Computer crime Security Resistance Cybersecurity Attack graph Identifying codes Integrity Certificate-less PKI Equivalence relations Dominating codes Ethereum Graph Theory Internet of Things Servers WSN Graph theory Communication V2X Hardness Sécurité Complexité Simulation Cloud Computing Computer architecture Boolean Satisfiability Problems Wireless communication Functional Encryption Dataset Clustering

 

 

Publications avec texte intégral

119

Références bibliographiques

489

Open access

28 %

 

Collaborations par pays