index - Equipe Cybersécurité et Cryptographie Accéder directement au contenu

Dernières publications

Mots clés

Equivalence relations Industry HSM Software Bridge Vehicular networks Computer crime Dynamic system Anomaly detection NP-completeness Twin-Free Graphs Polynomial Reduction Resistance Protocols Complexity Symmetric difference distance HIP Blockchains Clustering Graph theory Industries Secure Elements Dominating codes Dataset WSN Identifying Codes Uniqueness of Solution Classification algorithms Blockchain Internet of Things Physical unclonable function Program processors Industrial Environment Connected vehicles Functional Encryption Ethereum Domination Sécurité IoT Simulation Demi-treillis à médianes Hardware Servers Access Control Computer architecture Internet Dual pairing vector spaces Access control Complexity theory Algorithm Integrity PKI Costs OPC UA Privacy C-ITS Cryptography CAM Internet of Things IoT Communication V2X Certificate Machine learning Dynamic attack graph Countermeasure Combinatorial optimization Finite fields Virtualization and Cloud Computing Authentication Certificate request Graph Theory Bent ETSI Identifying codes Boolean Satisfiability Problems Cybersécurité Information dissemination Classification Actuators User-Centric Identity Misbehavior Detection OpenID Data centers Graph Complexité Certificate-less PKI Named Data Networking Microcontrollers Hardness Wireless communication Cloud Computing Security Complexity Theory Cybersecurity Risk assessment Cryptographic accumulators Decision Problems Machine Learning Attack graph Arabic Natural Language Processing Apprentissage automatique

 

 

Publications avec texte intégral

133

Références bibliographiques

502

Open access

29 %

 

Collaborations par pays