index - Equipe Cybersécurité et Cryptographie

Dernières publications

Mots clés

Ethereum Complexity theory Equivalence relations Data security Computer crime HIP Adaptation models Cryptanalysis and other attacks Connected vehicles Protocols CAM C-ITS User-Centric Identity Internet of Things IoT Uniqueness of Solution Risk assessment Attack graph Software Twin-Free Graphs Combinatorial optimization NP-completeness PKI Named Data Networking Apprentissage automatique Network security Boolean Satisfiability Problems Misbehavior Detection Secure Elements Security ETSI Complexité Decision Problems Dominating codes Certificate request Privacy Internet Delays Classification Clustering Cybersecurity Communication V2X Symmetric cryptography Countermeasure Blockchains Industrial Environment Complexity Strong solutions Cryptographic accumulators Simulation Authentication Hardware Machine learning Access Control Graph theory Classification algorithms Industry Certificate-less PKI Arabic Natural Language Processing Bridge Block and stream ciphers Servers Algorithm Resistance Internet of Things Computer architecture Domination Cybersécurité Complexity Theory Vehicular networks Machine Learning Dataset Digital signatures Polynomial Reduction Security and privacy Symmetric difference distance Certificate Virtualization and Cloud Computing Costs Microcontrollers Blockchain OpenID Entropy Identifying codes OPC UA Data centers Physical unclonable function Cloud Computing Demi-treillis à médianes Cryptography Program processors Sécurité Actuators Access control WSN Anomaly detection Bent Wireless communication Graph Theory IoT Identifying Codes

 

 

Publications avec texte intégral

136

Références bibliographiques

508

Open access

29 %

 

Collaborations par pays