index - Equipe Cybersécurité et Cryptographie Accéder directement au contenu

Dernières publications

Mots clés

Resistance Clustering Hardware Data centers Identifying Codes Servers Internet of Things IoT Classification algorithms Dataset Equivalence relations Complexity Theory Access Control Identifying codes Actuators Industry Attack graph Integrity Internet of Things Vehicular networks Security Blockchain Cybersecurity Connected vehicles WSN Functional Encryption Certificate request Twin-Free Graphs Uniqueness of Solution OPC UA Hardness Dynamic system User-Centric Identity Graph theory C-ITS Cybersécurité Access control Misbehavior Detection Lattice-Based Cryptography PKI Physical unclonable function Microcontrollers ETSI Computer crime Domination Arabic Natural Language Processing Dynamic attack graph Graph Theory Finite fields Simulation Graph NP-completeness Complexity Communication V2X Machine learning Costs Cryptography Wireless communication Privacy Algorithm Apprentissage automatique Certificate-less PKI Symmetric difference distance Internet of things IoT Demi-treillis à médianes Polynomial Reduction Bridge Risk assessment Anomaly detection IoT Complexité Countermeasure Boolean Satisfiability Problems Industrial Environment Combinatorial optimization Program processors Authentication Bent Certificate Named Data Networking CAM Ethereum Information dissemination OpenID Secure Elements Computer architecture Machine Learning Decision Problems Complexity theory Cloud Computing Blockchains HIP Classification Sécurité Protocols Industries Software Internet HSM Dominating codes Virtualization and Cloud Computing

 

 

Publications avec texte intégral

119

Références bibliographiques

491

Open access

28 %

 

Collaborations par pays