index - Equipe Cybersécurité et Cryptographie Accéder directement au contenu

Dernières publications

Mots clés

Resistance Privacy IoT Cloud Computing Costs Computer architecture Internet Functional Encryption Clustering Risk assessment OpenID Dataset Arabic Natural Language Processing Dynamic system Anomaly detection Authentication Vehicular networks Data centers User-Centric Identity Symmetric difference distance Information dissemination Misbehavior Detection Finite fields NP-completeness Complexity Certificate Decision Problems Access Control Internet of things IoT Internet of Things Machine learning Security Physical unclonable function Hardness Countermeasure Communication V2X Software Algorithm Graph Complexity theory Graph theory Wireless communication Cryptography Attack graph CAM Program processors Integrity Twin-Free Graphs Simulation Bent Bridge Classification Ethereum Industries HIP Actuators Identifying Codes Linear order Demi-treillis à médianes Lattice-Based Cryptography Blockchain Combinatorial optimization Dynamic attack graph Internet of Things IoT Access control Classification algorithms Uniqueness of Solution ETSI Industry Virtualization and Cloud Computing Cybersécurité Named Data Networking C-ITS Industrial Environment Equivalence relations Secure Elements Computer crime Certificate-less PKI OPC UA Microcontrollers PKI Complexité Connected vehicles Machine Learning Dominating codes Certificate request Identifying codes Cybersecurity Blockchains Protocols Hardware Polynomial Reduction Graph Theory Complexity Theory HSM Servers Sécurité Boolean Satisfiability Problems Apprentissage automatique WSN

 

 

Publications avec texte intégral

119

Références bibliographiques

489

Open access

28 %

 

Collaborations par pays