index - Equipe Cybersécurité et Cryptographie Accéder directement au contenu

Dernières publications

Mots clés

Blockchain Apprentissage automatique Simulation HIP Misbehavior Detection CAM Countermeasure WSN Cloud Computing Microcontrollers C-ITS Symmetric difference distance Uniqueness of Solution Certificate request Computer crime Internet of Things IoT Finite fields Security Complexity theory Communication V2X PKI Physical unclonable function Sécurité Polynomial Reduction Software Cryptography Named Data Networking Cybersecurity Data centers Actuators Protocols Machine learning Internet of Things Industrial Environment Dominating codes Authentication Servers Resistance Graph Theory Hardness Complexity Theory Dynamic attack graph Dataset Arabic Natural Language Processing Access Control Graph Blockchains Combinatorial optimization Virtualization and Cloud Computing OpenID Lattice-Based Cryptography Computer architecture Integrity IoT Algorithm Wireless communication Anomaly detection Demi-treillis à médianes Costs Complexity Hardware Internet of things IoT Information dissemination Bent Domination Access control Attack graph Secure Elements Classification algorithms Graph theory Identifying Codes Program processors Dynamic system Classification Privacy Clustering Ethereum Certificate Machine Learning OPC UA Connected vehicles Risk assessment Industries ETSI Certificate-less PKI HSM Internet Identifying codes Twin-Free Graphs Bridge Cybersécurité Vehicular networks Complexité Industry Functional Encryption Decision Problems Boolean Satisfiability Problems User-Centric Identity Equivalence relations NP-completeness

 

 

Publications avec texte intégral

128

Références bibliographiques

499

Open access

29 %

 

Collaborations par pays