Seguir
Jean-Marc Robert
Jean-Marc Robert
Professor of information Technology, ETS
Dirección de correo verificada de etsmtl.ca
Título
Citado por
Citado por
Año
Privacy amplification by public discussion
CH Bennett, G Brassard, JM Robert
SIAM journal on Computing 17 (2), 210-229, 1988
12461988
All-or-nothing disclosure of secrets
G Brassard, C Crépeau, JM Robert
Conference on the Theory and Application of Cryptographic Techniques, 234-238, 1986
4591986
Information theoretic reductions among disclosure problems
G Brassard, C Crépeau, JM Robert
27th Annual Symposium on Foundations of Computer Science (sfcs 1986), 168-173, 1986
2471986
The evolution of viruses and worms
TM Chen, JM Robert
Statistical methods in computer security, 289-310, 2004
1142004
Rogue access point detection in wireless networks
JM Robert, M Barbeau
US Patent 7,716,740, 2010
1052010
Application of cut-sets to network interdependency security risk assessment
D Wiemer, JM Robert, B McFarlane, C Gustave, S Chow, J Tang
US Patent App. 11/232,004, 2007
962007
Quantifying the space-efficiency of 2D graphical representations of trees
MJ McGuffin, JM Robert
Information Visualization 9 (2), 115-140, 2010
882010
An optimal algorithm for the (≤ k)-levels, with applications to separation and transversal problems
H Everett, JMR Robert, M Van Kreveld
International Journal of Computational Geometry and Applications 6 (3), 247-261, 1996
84*1996
Worm epidemics in high-speed networks
TM Chen, JM Robert
Computer 37 (6), 48-53, 2004
822004
An efficient approach to detect torrentlocker ransomware in computer systems
F Mbol, JM Robert, A Sadighian
Cryptology and Network Security: 15th International Conference, CANS 2016 …, 2016
682016
System and method for detecting abnormal traffic based on early notification
JM Robert, FJN Cosquer
US Patent 7,757,283, 2010
672010
Structured peer-to-peer overlay networks: Ideal botnets command and control infrastructures?
CR Davis, S Neville, JM Fernandez, JM Robert, J McHugh
Computer Security-ESORICS 2008: 13th European Symposium on Research in …, 2008
652008
Smartphone malware detection: From a survey towards taxonomy
A Amamra, C Talhi, JM Robert
2012 7th International Conference on Malicious and Unwanted Software, 79-86, 2012
622012
Computational geometry and facility location
JM Robert, G Toussaint
591990
IP Time to Live (TTL) field used as a covert channel
E Jones, O Le Moigne, JM Robert
US Patent 7,415,018, 2008
582008
A terrorist-fraud resistant and extractor-free anonymous distance-bounding protocol
G Avoine, X Bultel, S Gambs, D Gérault, P Lafourcade, C Onete, ...
Proceedings of the 2017 ACM on Asia conference on computer and …, 2017
462017
Containment mechanism for potentially contaminated end systems
STH Chow, JM Robert, K McNamee, D Wiemer, BK McFarlane
US Patent 8,020,207, 2011
452011
Prover anonymous and deniable distance-bounding authentication
S Gambs, C Onete, JM Robert
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
432014
Mechanism for tracing back anonymous network flows in autonomous systems
E Jones, JM Robert
US Patent 7,565,426, 2009
432009
IP traceback solutions based on time to live covert channel
E Jones, O Le Moigne, JM Robert
Proceedings. 2004 12th IEEE International Conference on Networks (ICON 2004 …, 2004
382004
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20