index - Equipe Cybersécurité et Cryptographie Accéder directement au contenu

Dernières publications

Mots clés

Wireless communication OPC UA Software OpenID Boolean Satisfiability Problems Authentication Bent Costs ETSI Combinatorial optimization Complexity Theory Attack graph Certificate request Secure Elements HSM Polynomial Reduction Ethereum Cybersecurity User-Centric Identity Blockchains Blockchain Twin-Free Graphs Classification Finite fields Cloud Computing Security Anomaly detection Clustering Program processors Risk assessment Sécurité LWE Servers Simulation Classification algorithms Physical unclonable function Information dissemination WSN Arabic Natural Language Processing Misbehavior Detection Access Control Domination Functional Encryption Decision Problems C-ITS Access control Complexity Apprentissage automatique Internet Machine learning Dominating codes Complexity theory Complexité IoT HIP NP-completeness Cryptography Machine Learning Microcontrollers Certificate-less PKI Integrity Named Data Networking Virtualization and Cloud Computing Hardware Identifying codes Certificate Dataset Data centers Internet of Things IoT Algorithm Demi-treillis à médianes Bridge Vehicular networks Resistance Cybersécurité Internet of things IoT Communication V2X Industry Dynamic attack graph Hardness Industries Symmetric difference distance PKI Identifying Codes Actuators Computer architecture CAM Graph Theory Internet of Things Computer crime Uniqueness of Solution Dynamic system Industrial Environment Protocols Equivalence relations Privacy Graph theory Connected vehicles Graph Countermeasure

 

 

Publications avec texte intégral

122

Références bibliographiques

491

Open access

28 %

 

Collaborations par pays