Dernières publications

Mots clés

Domination Twin-Free Graphs Computer crime Cryptanalysis and other attacks Dataset ETSI Blockchain Adaptation models Bent Servers Actuators Data security OpenID Graph Theory Entropy Data centers Vehicular networks HIP Certificate Program processors Internet Complexité Certificate-less PKI Machine Learning Decision Problems Cybersecurity Computer architecture Arabic Natural Language Processing Authentication Block and stream ciphers Communication V2X Named Data Networking Classification algorithms Clustering Cloud Computing NP-completeness Protocols Boolean Satisfiability Problems Internet of Things IoT Hardware Digital signatures Risk assessment Software Security OPC UA Access control Symmetric difference distance Cryptographic accumulators C-ITS CAM Ethereum Sécurité Complexity theory Polynomial Reduction Certificate request Privacy Combinatorial optimization Industry Identifying Codes Identifying codes Internet of Things IoT Virtualization and Cloud Computing Strong solutions Classification Anomaly detection Costs Misbehavior Detection Equivalence relations Complexity Theory Simulation Secure Elements Symmetric cryptography Industrial Environment Machine learning Resistance Security and privacy Blockchains Uniqueness of Solution Demi-treillis à médianes Attack graph Wireless communication Algorithm Dominating codes Connected vehicles Cryptography WSN Microcontrollers Graph theory Apprentissage automatique Access Control Countermeasure PKI User-Centric Identity Cybersécurité Delays Network security Physical unclonable function Bridge Complexity

 

 

Publications avec texte intégral

140

Références bibliographiques

510

Open access

30 %

 

Collaborations par pays