Dernières publications

Mots clés

Twin-Free Graphs Combinatorial optimization Certificate Digital signatures OPC UA IoT Certificate request Differential privacy Machine Learning Complexity Theory Internet Entropy Countermeasure Access control Internet of Things IoT Symmetric cryptography Blockchains Resistance Apprentissage automatique Data security Ethereum Blockchain Vehicular networks Connected vehicles Named Data Networking Virtualization and Cloud Computing Decision Problems Internet of Things Graph Theory Program processors Actuators Dominating codes Complexity theory Uniqueness of Solution Arabic Natural Language Processing Anomaly detection Physical unclonable function Algorithm Classification Complexité Cybersecurity Delays Strong solutions Secure Elements Demi-treillis à médianes NP-completeness Authentication Computer crime User-Centric Identity Dataset Identifying codes PKI Security and privacy Machine learning Equivalence relations Hardware Cryptographic accumulators Communication V2X Industrial Environment Security Wireless communication Sécurité Cybersécurité Servers WSN Costs Network security Industry Attack graph Software Clustering Certificate-less PKI Privacy Bent C-ITS OpenID Data centers Identifying Codes Cryptography Adaptation models Computer architecture Risk assessment Simulation Graph theory Access Control Protocols Cloud Computing CAM Classification algorithms Polynomial Reduction Complexity Block and stream ciphers HIP Cryptanalysis and other attacks Boolean Satisfiability Problems Misbehavior Detection ETSI Symmetric difference distance Bridge Microcontrollers

 

 

Publications avec texte intégral

138

Références bibliographiques

513

Open access

29 %

 

Collaborations par pays