index - Equipe Cybersécurité et Cryptographie Accéder directement au contenu

Dernières publications

Chargement de la page

Mots clés

Cryptography Simulation Sécurité Industries Blockchains Uniqueness of Solution Named Data Networking Ethereum Complexity Symmetric difference distance Boolean Satisfiability Problems Blockchain Cloud Computing Dominating codes Computer crime HIP Wireless communication Certificate request Classification HSM Internet Demi-treillis à médianes OPC UA Machine learning Virtualization and Cloud Computing Industrial Environment Graph Secure Elements Linear order ETSI Equivalence relations User-Centric Identity Lattice-Based Cryptography Access Control Industry Polynomial Reduction Identifying codes Algorithm Countermeasure Resistance PKI Functional Encryption Dynamic attack graph CAM Certificate WSN Security Complexity theory NP-completeness Finite fields Hardness Software Complexity Theory C-ITS Protocols Cybersécurité Internet of things IoT Data centers Graph Theory Access control Machine Learning Program processors Servers Internet of Things IoT Combinatorial optimization Certificate-less PKI Internet of Things Classification algorithms Communication V2X Hardware Attack graph Cybersecurity Actuators Risk assessment Decision Problems Dynamic system Identifying Codes OpenID Bent Vehicular networks Dataset Graph theory Physical unclonable function Information dissemination Apprentissage automatique Computer architecture Integrity Clustering Microcontrollers Authentication Anomaly detection Privacy Costs Bridge Complexité Connected vehicles Arabic Natural Language Processing Misbehavior Detection Twin-Free Graphs IoT

 

 

Publications avec texte intégral

119

Références bibliographiques

Chargement de la page

Open access

28 %

 

Collaborations par pays