index - Equipe Cybersécurité et Cryptographie Accéder directement au contenu

Dernières publications

Mots clés

Lattice-Based Cryptography Costs Software Internet of Things Certificate-less PKI ETSI WSN Computer crime Bridge Named Data Networking Dominating codes Protocols Apprentissage automatique Algorithm Internet Linear order HSM Integrity Servers Attack graph Program processors PKI Twin-Free Graphs Anomaly detection Wireless communication Resistance Access control Cryptography NP-completeness Cybersecurity Microcontrollers Classification Internet of Things IoT Demi-treillis à médianes Machine Learning Clustering Data centers User-Centric Identity Hardness OPC UA Physical unclonable function Dataset Polynomial Reduction Graph Complexity theory Industries Certificate Blockchains Complexity Theory Classification algorithms Certificate request Graph Theory Cloud Computing Communication V2X Simulation Finite fields Boolean Satisfiability Problems Arabic Natural Language Processing Access Control Countermeasure Complexité Risk assessment OpenID Privacy Computer architecture Ethereum Industry Machine learning Sécurité Internet of things IoT Equivalence relations Dynamic attack graph CAM C-ITS Functional Encryption Blockchain Virtualization and Cloud Computing Uniqueness of Solution Identifying codes Decision Problems Hardware Industrial Environment Symmetric difference distance Cybersécurité Graph theory Authentication Bent Security Secure Elements Dynamic system Identifying Codes Vehicular networks Combinatorial optimization Actuators Connected vehicles Information dissemination IoT Complexity HIP Misbehavior Detection

 

 

Publications avec texte intégral

119

Références bibliographiques

489

Open access

28 %

 

Collaborations par pays