index - Equipe Cybersécurité et Cryptographie Accéder directement au contenu

Dernières publications

Mots clés

Complexity theory Identifying Codes Countermeasure Servers Access control Computer architecture Dataset Information dissemination Industry Cybersecurity Industrial Environment Cryptography Authentication Machine Learning Graph Theory Internet of things IoT Dynamic attack graph Microcontrollers Virtualization and Cloud Computing User-Centric Identity Computer crime Functional Encryption OPC UA Risk assessment C-ITS Symmetric difference distance Anomaly detection Lattice-Based Cryptography Simulation Arabic Natural Language Processing Clustering Misbehavior Detection Secure Elements Connected vehicles Certificate request Security Boolean Satisfiability Problems Data centers IoT Demi-treillis à médianes NP-completeness Privacy Complexity Theory Apprentissage automatique Protocols Blockchains Dynamic system Combinatorial optimization Attack graph Decision Problems Costs HIP Cloud Computing PKI Bridge Cybersécurité Internet Access Control Certificate-less PKI Domination Classification Hardware Actuators Polynomial Reduction CAM Graph Wireless communication Vehicular networks ETSI Resistance Industries Classification algorithms Graph theory Internet of Things Program processors Physical unclonable function Communication V2X Identifying codes Finite fields Complexité HSM Machine learning Ethereum OpenID Internet of Things IoT Uniqueness of Solution WSN Software Algorithm Named Data Networking Twin-Free Graphs Sécurité Equivalence relations Integrity Certificate Bent Blockchain Complexity Hardness Dominating codes

 

 

Publications avec texte intégral

129

Références bibliographiques

499

Open access

29 %

 

Collaborations par pays