Подписаться
Jean-Marc Robert
Jean-Marc Robert
Professor of information Technology, ETS
Подтвержден адрес электронной почты в домене etsmtl.ca
Название
Процитировано
Процитировано
Год
Privacy amplification by public discussion
CH Bennett, G Brassard, JM Robert
SIAM journal on Computing 17 (2), 210-229, 1988
12441988
All-or-nothing disclosure of secrets
G Brassard, C Crépeau, JM Robert
Conference on the Theory and Application of Cryptographic Techniques, 234-238, 1986
4571986
Information theoretic reductions among disclosure problems
G Brassard, C Crépeau, JM Robert
27th Annual Symposium on Foundations of Computer Science (sfcs 1986), 168-173, 1986
2471986
The evolution of viruses and worms
TM Chen, JM Robert
Statistical methods in computer security, 289-310, 2004
1142004
Rogue access point detection in wireless networks
JM Robert, M Barbeau
US Patent 7,716,740, 2010
1052010
Application of cut-sets to network interdependency security risk assessment
D Wiemer, JM Robert, B McFarlane, C Gustave, S Chow, J Tang
US Patent App. 11/232,004, 2007
942007
Quantifying the space-efficiency of 2D graphical representations of trees
MJ McGuffin, JM Robert
Information Visualization 9 (2), 115-140, 2010
882010
An optimal algorithm for the (≤ k)-levels, with applications to separation and transversal problems
H Everett, JMR Robert, M Van Kreveld
International Journal of Computational Geometry and Applications 6 (3), 247-261, 1996
84*1996
Worm epidemics in high-speed networks
TM Chen, JM Robert
Computer 37 (6), 48-53, 2004
822004
An efficient approach to detect torrentlocker ransomware in computer systems
F Mbol, JM Robert, A Sadighian
Cryptology and Network Security: 15th International Conference, CANS 2016 …, 2016
672016
System and method for detecting abnormal traffic based on early notification
JM Robert, FJN Cosquer
US Patent 7,757,283, 2010
672010
Structured peer-to-peer overlay networks: Ideal botnets command and control infrastructures?
CR Davis, S Neville, JM Fernandez, JM Robert, J McHugh
Computer Security-ESORICS 2008: 13th European Symposium on Research in …, 2008
652008
Smartphone malware detection: From a survey towards taxonomy
A Amamra, C Talhi, JM Robert
2012 7th International Conference on Malicious and Unwanted Software, 79-86, 2012
622012
Computational geometry and facility location
JM Robert, G Toussaint
591990
IP Time to Live (TTL) field used as a covert channel
E Jones, O Le Moigne, JM Robert
US Patent 7,415,018, 2008
582008
A terrorist-fraud resistant and extractor-free anonymous distance-bounding protocol
G Avoine, X Bultel, S Gambs, D Gérault, P Lafourcade, C Onete, ...
Proceedings of the 2017 ACM on Asia conference on computer and …, 2017
462017
Containment mechanism for potentially contaminated end systems
STH Chow, JM Robert, K McNamee, D Wiemer, BK McFarlane
US Patent 8,020,207, 2011
452011
Prover anonymous and deniable distance-bounding authentication
S Gambs, C Onete, JM Robert
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
432014
Mechanism for tracing back anonymous network flows in autonomous systems
E Jones, JM Robert
US Patent 7,565,426, 2009
432009
IP traceback solutions based on time to live covert channel
E Jones, O Le Moigne, JM Robert
Proceedings. 2004 12th IEEE International Conference on Networks (ICON 2004 …, 2004
382004
В данный момент система не может выполнить эту операцию. Повторите попытку позднее.
Статьи 1–20