index - Equipe Cybersécurité et Cryptographie Accéder directement au contenu

Dernières publications

Mots clés

Countermeasure Sécurité Risk assessment Computer crime Anomaly detection Apprentissage automatique Actuators Physical unclonable function Cybersécurité Complexité Uniqueness of Solution Information dissemination Dynamic system Access control Complexity Servers Authentication Blockchains Privacy Arabic Natural Language Processing Data centers Ethereum Microcontrollers Access Control OpenID Industrial Environment HIP CAM Graph Protocols Linear order Named Data Networking HSM Certificate Dominating codes User-Centric Identity Cybersecurity Symmetric difference distance Attack graph Industries Industry Misbehavior Detection Graph Theory Equivalence relations Internet of things IoT Software Complexity Theory NP-completeness Cryptography Finite fields Functional Encryption Polynomial Reduction Identifying codes Classification algorithms Dataset Complexity theory ETSI Computer architecture Certificate request PKI Internet of Things IoT Algorithm Communication V2X WSN Machine learning Classification Machine Learning Internet of Things Program processors Bent Secure Elements Cloud Computing Clustering Demi-treillis à médianes Boolean Satisfiability Problems Simulation Wireless communication Combinatorial optimization IoT OPC UA Resistance Virtualization and Cloud Computing Graph theory Bridge Internet Identifying Codes Twin-Free Graphs Security Hardware Decision Problems Lattice-Based Cryptography Blockchain Certificate-less PKI Costs Dynamic attack graph C-ITS Integrity Connected vehicles Vehicular networks Hardness

 

 

Publications avec texte intégral

119

Références bibliographiques

489

Open access

28 %

 

Collaborations par pays