index - Equipe Cybersécurité et Cryptographie Accéder directement au contenu

Dernières publications

Mots clés

Dominating codes Ethereum Countermeasure Boolean Satisfiability Problems Physical unclonable function Lattice-Based Cryptography Program processors Identifying Codes Privacy Clustering Algorithm Blockchain HIP Identifying codes Security Connected vehicles Microcontrollers Virtualization and Cloud Computing Protocols Graph Theory Costs Demi-treillis à médianes WSN Complexity Theory NP-completeness Certificate request Servers Cloud Computing Industrial Environment Industries Industry Apprentissage automatique OPC UA Wireless communication Internet of Things IoT Simulation Internet Sécurité Decision Problems CAM Complexity Dynamic system User-Centric Identity Blockchains Computer crime Graph Vehicular networks Cryptography Symmetric difference distance Polynomial Reduction Secure Elements Software Information dissemination OpenID Uniqueness of Solution Integrity Actuators Bridge Attack graph Twin-Free Graphs Resistance Functional Encryption Machine Learning Linear order Dynamic attack graph HSM Certificate-less PKI Dataset Arabic Natural Language Processing PKI Anomaly detection Machine learning Cybersécurité Equivalence relations Classification algorithms C-ITS Risk assessment Access Control IoT Finite fields Internet of things IoT Hardware Computer architecture Cybersecurity Hardness Misbehavior Detection Certificate Communication V2X Bent Complexity theory Named Data Networking Combinatorial optimization Graph theory Data centers Authentication Internet of Things Complexité Classification Access control ETSI

 

 

Publications avec texte intégral

119

Références bibliographiques

489

Open access

28 %

 

Collaborations par pays