index - Equipe Cybersécurité et Cryptographie Accéder directement au contenu

Dernières publications

Mots clés

Hardness Microcontrollers Resistance Named Data Networking Countermeasure Ethereum Twin-Free Graphs Access control Certificate-less PKI Apprentissage automatique Attack graph Combinatorial optimization Wireless communication Secure Elements Complexity theory Cryptography Industries User-Centric Identity Authentication Complexité OpenID Dataset Finite fields Uniqueness of Solution Information dissemination Classification algorithms Complexity Theory Demi-treillis à médianes Program processors Internet Risk assessment Industry Physical unclonable function Bridge Cloud Computing Certificate Hardware Equivalence relations Arabic Natural Language Processing Symmetric difference distance Blockchains Graph Classification Decision Problems Complexity Certificate request Graph Theory WSN Sécurité Integrity ETSI Access Control Dominating codes Functional Encryption Machine learning Data centers Vehicular networks Identifying Codes OPC UA Virtualization and Cloud Computing Simulation PKI Costs Protocols Internet of things IoT Computer crime Domination Polynomial Reduction NP-completeness Identifying codes Communication V2X Industrial Environment Dynamic system CAM Machine Learning Lattice-Based Cryptography C-ITS Computer architecture Dynamic attack graph Actuators IoT Cybersécurité Connected vehicles Anomaly detection Bent Graph theory Misbehavior Detection HSM Internet of Things Servers Cybersecurity Privacy Internet of Things IoT Clustering HIP Algorithm Blockchain Boolean Satisfiability Problems Security Software

 

 

Publications avec texte intégral

119

Références bibliographiques

491

Open access

28 %

 

Collaborations par pays