index - Equipe Cybersécurité et Cryptographie Accéder directement au contenu

Dernières publications

Mots clés

Certificate-less PKI Privacy Domination Demi-treillis à médianes Certificate request Graph Bridge Complexité Industrial Environment Blockchain NP-completeness Communication V2X Computer architecture Anomaly detection Access control Misbehavior Detection Boolean Satisfiability Problems IoT Simulation Servers Polynomial Reduction Software Blockchains Certificate Combinatorial optimization Cryptography Uniqueness of Solution Secure Elements Apprentissage automatique Dynamic system Classification algorithms Complexity Dataset Physical unclonable function Integrity HIP Resistance Decision Problems Wireless communication Classification Internet of Things Graph Theory Virtualization and Cloud Computing ETSI Complexity Theory Authentication Attack graph Industries Internet Machine learning Connected vehicles Industry Access Control Internet of things IoT Identifying codes Risk assessment Security Actuators Bent Computer crime Microcontrollers Ethereum Graph theory Hardware Dynamic attack graph Internet of Things IoT Protocols Clustering Algorithm Finite fields CAM OpenID Twin-Free Graphs Dominating codes User-Centric Identity Countermeasure Cloud Computing Costs PKI Functional Encryption Identifying Codes Named Data Networking OPC UA Symmetric difference distance Hardness Complexity theory HSM Information dissemination Equivalence relations Machine Learning Cybersécurité Cybersecurity Lattice-Based Cryptography Data centers WSN Vehicular networks Arabic Natural Language Processing Sécurité Program processors C-ITS

 

 

Publications avec texte intégral

125

Références bibliographiques

499

Open access

28 %

 

Collaborations par pays