index - Equipe Cybersécurité et Cryptographie

Dernières publications

Mots clés

Cybersécurité Certificate Security and privacy Complexity Theory Certificate request Combinatorial optimization Algorithm Hardware Privacy Dominating codes Symmetric cryptography Block and stream ciphers Data security Complexity theory Graph theory C-ITS Blockchain HIP Internet OPC UA Cloud Computing ETSI Clustering Twin-Free Graphs Wireless communication Simulation Servers Computer crime Domination Resistance Computer architecture CAM Polynomial Reduction Industry PKI User-Centric Identity Entropy Ethereum Industrial Environment Secure Elements Certificate-less PKI Equivalence relations WSN Anomaly detection Digital signatures Identifying Codes Costs Complexité Symmetric difference distance Blockchains Complexity Physical unclonable function Program processors Risk assessment Misbehavior Detection Cryptography Microcontrollers NP-completeness Actuators Uniqueness of Solution Machine Learning Security Boolean Satisfiability Problems Graph Theory Named Data Networking Virtualization and Cloud Computing Access control Vehicular networks Strong solutions Bridge Connected vehicles Cybersecurity Sécurité OpenID Data centers Cryptographic accumulators Protocols Communication V2X Apprentissage automatique Cryptanalysis and other attacks Bent Dual pairing vector spaces Internet of Things Authentication Classification algorithms Delays IoT Network security Arabic Natural Language Processing Identifying codes Internet of Things IoT Decision Problems Software Classification Demi-treillis à médianes Access Control Dataset Attack graph Machine learning Countermeasure

 

 

Publications avec texte intégral

135

Références bibliographiques

505

Open access

29 %

 

Collaborations par pays