index - Equipe Cybersécurité et Cryptographie

Dernières publications

Mots clés

Identifying codes Attack graph Risk assessment Machine learning Entropy Servers Complexity theory Combinatorial optimization Symmetric cryptography Access Control Polynomial Reduction Symmetric difference distance Virtualization and Cloud Computing C-ITS Authentication Physical unclonable function Certificate Privacy Blockchains Domination Bent Dominating codes Security IoT Dataset Computer architecture Cryptanalysis and other attacks Countermeasure Network security Secure Elements Cryptographic accumulators Complexity Theory Bridge Internet of Things Clustering Actuators Graph Theory Cloud Computing Communication V2X Complexity Resistance HIP Ethereum Certificate request Costs Sécurité Internet of Things IoT WSN Decision Problems CAM Protocols Cybersécurité Misbehavior Detection OpenID Delays ETSI Equivalence relations Access control Machine Learning Computer crime Dual pairing vector spaces Demi-treillis à médianes Classification Cybersecurity Security and privacy Data centers Industrial Environment Microcontrollers Arabic Natural Language Processing Program processors Strong solutions Graph theory NP-completeness Anomaly detection Blockchain Classification algorithms Cryptography User-Centric Identity Software Simulation Certificate-less PKI Industry Identifying Codes Apprentissage automatique Vehicular networks Internet OPC UA Twin-Free Graphs Wireless communication Boolean Satisfiability Problems Data security Connected vehicles Hardware Uniqueness of Solution Named Data Networking Complexité Digital signatures PKI Algorithm Block and stream ciphers

 

 

Publications avec texte intégral

136

Références bibliographiques

507

Open access

29 %

 

Collaborations par pays