index - Equipe Cybersécurité et Cryptographie Accéder directement au contenu

Dernières publications

Mots clés

Actuators Graph Dataset Dynamic attack graph Access Control Integrity Complexity theory Certificate request Microcontrollers Certificate Arabic Natural Language Processing Blockchain Industrial Environment Cybersécurité Hardness Authentication Virtualization and Cloud Computing WSN NP-completeness Attack graph Simulation Servers Dominating codes Computer architecture Complexité ETSI C-ITS Cryptography Apprentissage automatique Secure Elements Costs Wireless communication Information dissemination Program processors Twin-Free Graphs Privacy Computer crime Internet of Things IoT Demi-treillis à médianes Machine learning Data centers Equivalence relations Domination Access control Complexity Internet of things IoT Graph Theory Identifying codes Identifying Codes HIP Sécurité Finite fields Hardware HSM Communication V2X Risk assessment Security Industries Classification algorithms Uniqueness of Solution Countermeasure Industry Algorithm Cloud Computing OpenID Resistance Polynomial Reduction Decision Problems Software Cybersecurity Bridge Physical unclonable function Vehicular networks Lattice-Based Cryptography User-Centric Identity Symmetric difference distance Ethereum Protocols Connected vehicles Dynamic system Combinatorial optimization Machine Learning Anomaly detection Classification Misbehavior Detection Functional Encryption Complexity Theory Blockchains CAM PKI OPC UA Internet of Things Internet IoT Certificate-less PKI Clustering Bent Graph theory Named Data Networking Boolean Satisfiability Problems

 

 

Publications avec texte intégral

119

Références bibliographiques

491

Open access

28 %

 

Collaborations par pays