关注
Jean-Marc Robert
Jean-Marc Robert
Professor of information Technology, ETS
在 etsmtl.ca 的电子邮件经过验证
标题
引用次数
引用次数
年份
Privacy amplification by public discussion
CH Bennett, G Brassard, JM Robert
SIAM journal on Computing 17 (2), 210-229, 1988
12661988
All-or-nothing disclosure of secrets
G Brassard, C Crépeau, JM Robert
Conference on the Theory and Application of Cryptographic Techniques, 234-238, 1986
4611986
Information theoretic reductions among disclosure problems
G Brassard, C Crépeau, JM Robert
27th Annual Symposium on Foundations of Computer Science (sfcs 1986), 168-173, 1986
2461986
The evolution of viruses and worms
TM Chen, JM Robert
Statistical methods in computer security, 289-310, 2004
1152004
Rogue access point detection in wireless networks
JM Robert, M Barbeau
US Patent 7,716,740, 2010
1072010
Application of cut-sets to network interdependency security risk assessment
D Wiemer, JM Robert, B McFarlane, C Gustave, S Chow, J Tang
US Patent App. 11/232,004, 2007
982007
Quantifying the space-efficiency of 2D graphical representations of trees
MJ McGuffin, JM Robert
Information Visualization 9 (2), 115-140, 2010
912010
Worm epidemics in high-speed networks
TM Chen, JM Robert
Computer 37 (6), 48-53, 2004
842004
An optimal algorithm for the (≤ k)-levels, with applications to separation and transversal problems
H Everett, JMR Robert, M Van Kreveld
International Journal of Computational Geometry and Applications 6 (3), 247-261, 1996
83*1996
System and method for detecting abnormal traffic based on early notification
JM Robert, FJN Cosquer
US Patent 7,757,283, 2010
682010
An efficient approach to detect torrentlocker ransomware in computer systems
F Mbol, JM Robert, A Sadighian
Cryptology and Network Security: 15th International Conference, CANS 2016 …, 2016
662016
Structured peer-to-peer overlay networks: Ideal botnets command and control infrastructures?
CR Davis, S Neville, JM Fernandez, JM Robert, J McHugh
Computer Security-ESORICS 2008: 13th European Symposium on Research in …, 2008
652008
Smartphone malware detection: From a survey towards taxonomy
A Amamra, C Talhi, JM Robert
2012 7th International Conference on Malicious and Unwanted Software, 79-86, 2012
612012
IP Time to Live (TTL) field used as a covert channel
E Jones, O Le Moigne, JM Robert
US Patent 7,415,018, 2008
592008
Computational geometry and facility location
JM Robert, G Toussaint
581990
Containment mechanism for potentially contaminated end systems
STH Chow, JM Robert, K McNamee, D Wiemer, BK McFarlane
US Patent 8,020,207, 2011
482011
A terrorist-fraud resistant and extractor-free anonymous distance-bounding protocol
G Avoine, X Bultel, S Gambs, D Gérault, P Lafourcade, C Onete, ...
Proceedings of the 2017 ACM on Asia conference on computer and …, 2017
462017
Prover anonymous and deniable distance-bounding authentication
S Gambs, C Onete, JM Robert
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
432014
Mechanism for tracing back anonymous network flows in autonomous systems
E Jones, JM Robert
US Patent 7,565,426, 2009
432009
IP traceback solutions based on time to live covert channel
E Jones, O Le Moigne, JM Robert
Proceedings. 2004 12th IEEE International Conference on Networks (ICON 2004 …, 2004
382004
系统目前无法执行此操作,请稍后再试。
文章 1–20