index - Equipe Cybersécurité et Cryptographie Accéder directement au contenu

Dernières publications

Mots clés

Costs Cybersécurité ETSI Software Computer architecture Polynomial Reduction HSM Cloud Computing Boolean Satisfiability Problems Security Access Control Internet of Things Classification algorithms Wireless communication Internet of Things IoT IoT Physical unclonable function WSN Simulation Classification Lattice-Based Cryptography Industries Graph Theory Dataset Attack graph PKI Information dissemination Access control Complexité Dynamic attack graph Twin-Free Graphs Connected vehicles Industrial Environment HIP Complexity Virtualization and Cloud Computing Cybersecurity Finite fields Functional Encryption Bridge Data centers Program processors Hardware Secure Elements Vehicular networks Blockchains Internet Dynamic system Apprentissage automatique Servers Misbehavior Detection Ethereum Sécurité Graph Arabic Natural Language Processing Blockchain C-ITS Actuators Countermeasure Industry NP-completeness Certificate request Clustering Computer crime Algorithm Certificate Uniqueness of Solution Protocols Resistance Machine Learning Authentication OpenID Complexity Theory Symmetric difference distance OPC UA Anomaly detection Cryptography Domination Complexity theory CAM Combinatorial optimization Bent Certificate-less PKI Communication V2X Risk assessment User-Centric Identity Microcontrollers Machine learning Equivalence relations Graph theory Demi-treillis à médianes Decision Problems Integrity Hardness Named Data Networking Internet of things IoT Privacy Identifying codes Identifying Codes Dominating codes

 

 

Publications avec texte intégral

119

Références bibliographiques

491

Open access

28 %

 

Collaborations par pays