index - Equipe Cybersécurité et Cryptographie Accéder directement au contenu

Dernières publications

Mots clés

Physical unclonable function Finite fields Decision Problems Privacy Graph Blockchain HSM Uniqueness of Solution Algorithm Dominating codes Virtualization and Cloud Computing Classification algorithms Arabic Natural Language Processing CAM Costs Internet of Things IoT Microcontrollers Wireless communication Actuators Information dissemination Industry Ethereum Dynamic attack graph Data centers Dynamic system HIP Combinatorial optimization Program processors Polynomial Reduction Graph theory Risk assessment Domination Certificate ETSI Clustering Misbehavior Detection Complexity theory Graph Theory Countermeasure OpenID Integrity NP-completeness Protocols Internet of Things IoT Complexity Theory Vehicular networks Internet of things IoT Classification Cybersecurity C-ITS Boolean Satisfiability Problems Hardness Hardware Industries Complexity Symmetric difference distance Twin-Free Graphs Security Authentication Access control Certificate request Identifying codes Sécurité WSN Cloud Computing Machine learning Cryptography Servers Computer architecture Software Industrial Environment Connected vehicles Demi-treillis à médianes Communication V2X Computer crime User-Centric Identity Access Control Simulation OPC UA Secure Elements PKI Resistance Bridge Blockchains Complexité Dataset Lattice-Based Cryptography Machine Learning Functional Encryption Certificate-less PKI Identifying Codes Internet Cybersécurité Attack graph Named Data Networking Bent Apprentissage automatique Equivalence relations Anomaly detection

 

 

Publications avec texte intégral

129

Références bibliographiques

Chargement de la page

Open access

29 %

 

Collaborations par pays