index - Equipe Cybersécurité et Cryptographie Accéder directement au contenu

Dernières publications

Mots clés

Graph Internet Identifying Codes Dataset Connected vehicles Decision Problems Internet of Things IoT Physical unclonable function Hardware Resistance Integrity Finite fields Clustering Industrial Environment Information dissemination Functional Encryption OPC UA Security Classification algorithms ETSI Cybersécurité Costs Complexity theory Ethereum Attack graph Complexity Combinatorial optimization Machine Learning Internet of things IoT Communication V2X Complexité Actuators Algorithm Machine learning HIP Computer architecture Servers C-ITS Access Control HSM Vehicular networks Named Data Networking Graph Theory Sécurité Classification Bent Twin-Free Graphs Simulation Authentication Internet of Things Bridge Wireless communication NP-completeness CAM Polynomial Reduction Privacy Apprentissage automatique Protocols Cryptography Virtualization and Cloud Computing Certificate-less PKI Graph theory Dominating codes WSN Access control Cloud Computing OpenID Certificate request Anomaly detection Microcontrollers IoT Secure Elements Dynamic attack graph Dynamic system Symmetric difference distance Computer crime Certificate Boolean Satisfiability Problems Blockchains Lattice-Based Cryptography Countermeasure Misbehavior Detection Hardness Identifying codes Risk assessment Program processors Industry Software Equivalence relations Uniqueness of Solution Industries Demi-treillis à médianes Data centers User-Centric Identity Linear order PKI Arabic Natural Language Processing Complexity Theory Blockchain Cybersecurity

 

 

Publications avec texte intégral

119

Références bibliographiques

489

Open access

28 %

 

Collaborations par pays