index - Equipe Cybersécurité et Cryptographie Accéder directement au contenu

Dernières publications

Mots clés

Computer crime Machine learning Symmetric difference distance Complexity Internet of Things IoT Attack graph Connected vehicles Complexity Theory C-ITS Certificate Lattice-Based Cryptography Integrity Hardware Dominating codes Dynamic system Wireless communication Machine Learning Resistance Information dissemination Authentication Blockchain Privacy Industry Equivalence relations IoT Sécurité Misbehavior Detection Costs Polynomial Reduction Software Anomaly detection Identifying codes Dynamic attack graph Industries Simulation Servers Communication V2X PKI Dataset Internet HSM Cybersécurité Classification algorithms OPC UA Data centers WSN Complexité Certificate-less PKI Boolean Satisfiability Problems Risk assessment Computer architecture Ethereum User-Centric Identity Decision Problems Physical unclonable function Graph Theory Bridge Actuators Demi-treillis à médianes Apprentissage automatique Arabic Natural Language Processing Finite fields Blockchains Linear order Named Data Networking OpenID Internet of Things Graph theory Uniqueness of Solution Countermeasure Certificate request ETSI CAM HIP Bent Access Control NP-completeness Hardness Functional Encryption Vehicular networks Access control Twin-Free Graphs Program processors Security Internet of things IoT Cryptography Cloud Computing Virtualization and Cloud Computing Complexity theory Graph Identifying Codes Protocols Cybersecurity Clustering Industrial Environment Combinatorial optimization Classification Secure Elements Algorithm Microcontrollers

 

 

Publications avec texte intégral

119

Références bibliographiques

489

Open access

28 %

 

Collaborations par pays