index - Equipe Cybersécurité et Cryptographie Accéder directement au contenu

Dernières publications

Mots clés

Microcontrollers Costs Blockchain Integrity Vehicular networks Servers Complexity Theory Dominating codes Attack graph Blockchains Actuators Computer crime Machine learning Misbehavior Detection Machine Learning Certificate request Apprentissage automatique Arabic Natural Language Processing Program processors Identifying Codes Cybersecurity OPC UA IoT Dynamic system Symmetric difference distance HIP Access control Computer architecture C-ITS Boolean Satisfiability Problems Internet of Things Graph HSM Complexity theory Functional Encryption Classification algorithms Demi-treillis à médianes WSN Industrial Environment Sécurité Data centers Lattice-Based Cryptography Hardware Wireless communication Polynomial Reduction Dataset Complexité Clustering CAM Named Data Networking Risk assessment PKI Authentication Security Certificate-less PKI ETSI Equivalence relations Combinatorial optimization Ethereum Graph theory NP-completeness Secure Elements Dynamic attack graph Certificate Twin-Free Graphs User-Centric Identity Physical unclonable function Anomaly detection Hardness Finite fields Information dissemination Virtualization and Cloud Computing Connected vehicles Internet Cryptography Cloud Computing Industries Software Communication V2X Bridge Classification Simulation OpenID Protocols Industry Access Control Algorithm Privacy Internet of things IoT Domination Uniqueness of Solution Resistance Cybersécurité Internet of Things IoT Identifying codes Bent Decision Problems Graph Theory Countermeasure Complexity

 

 

Publications avec texte intégral

129

Références bibliographiques

499

Open access

29 %

 

Collaborations par pays