index - Equipe Cybersécurité et Cryptographie

Dernières publications

Mots clés

Classification algorithms Security Complexity theory Cloud Computing Uniqueness of Solution Symmetric cryptography Communication V2X Industry Delays Blockchain Boolean Satisfiability Problems Graph Theory Misbehavior Detection OPC UA Twin-Free Graphs Software Costs Risk assessment Certificate PKI Industrial Environment Authentication Clustering Cryptographic accumulators Complexity Secure Elements Access Control Dominating codes Block and stream ciphers Program processors Identifying Codes Arabic Natural Language Processing IoT Named Data Networking Certificate request Security and privacy Combinatorial optimization Demi-treillis à médianes Polynomial Reduction Decision Problems NP-completeness Internet of Things IoT Attack graph Virtualization and Cloud Computing Cryptanalysis and other attacks Data security Domination WSN Data centers Computer crime Machine learning Internet Apprentissage automatique Dual pairing vector spaces Complexity Theory HIP Countermeasure Access control Classification Ethereum Cybersecurity Vehicular networks Complexité Actuators Bridge C-ITS Simulation OpenID Algorithm Blockchains Entropy Computer architecture Dataset Internet of Things Identifying codes Cybersécurité Connected vehicles User-Centric Identity Machine Learning Network security Wireless communication Microcontrollers Certificate-less PKI Hardware Anomaly detection Graph theory Sécurité Cryptography Strong solutions Digital signatures Servers Bent ETSI Privacy Physical unclonable function Protocols Resistance Symmetric difference distance CAM Equivalence relations

 

 

Publications avec texte intégral

135

Références bibliographiques

505

Open access

29 %

 

Collaborations par pays