index - Equipe Cybersécurité et Cryptographie

Dernières publications

Mots clés

Communication V2X C-ITS Access control Wireless communication Entropy Authentication Program processors Dominating codes Access Control Sécurité Internet of Things Certificate request Boolean Satisfiability Problems Virtualization and Cloud Computing Certificate Simulation Bent Cryptographic accumulators Network security Symmetric difference distance HIP OpenID Privacy Cloud Computing Cybersécurité Actuators Polynomial Reduction Blockchain Machine learning ETSI Internet Twin-Free Graphs Security Ethereum WSN Machine Learning OPC UA Anomaly detection Industry Algorithm Microcontrollers Complexity Theory Demi-treillis à médianes Software Computer architecture Equivalence relations Clustering IoT Connected vehicles Protocols Servers Digital signatures Data security Symmetric cryptography Industrial Environment Domination Graph Theory Apprentissage automatique Risk assessment Uniqueness of Solution Cryptography Dataset Hardware Countermeasure Delays Physical unclonable function Vehicular networks Resistance Data centers PKI Cryptanalysis and other attacks User-Centric Identity Internet of Things IoT Bridge Combinatorial optimization Adaptation models Attack graph Classification algorithms Arabic Natural Language Processing Complexity CAM Certificate-less PKI Cybersecurity Complexity theory Graph theory Blockchains Costs Decision Problems Strong solutions Secure Elements Computer crime Complexité Identifying codes Security and privacy Misbehavior Detection Identifying Codes Block and stream ciphers Classification Named Data Networking NP-completeness

 

 

Publications avec texte intégral

138

Références bibliographiques

508

Open access

29 %

 

Collaborations par pays