Jean-Marc Robert
Jean-Marc Robert
Professor of information Technology, ETS
Verifierad e-postadress på etsmtl.ca
TitelCiteras avÅr
Privacy amplification by public discussion
CH Bennett, G Brassard, JM Robert
SIAM journal on Computing 17 (2), 210-229, 1988
10021988
All-or-nothing disclosure of secrets
G Brassard, C Crépeau, JM Robert
Conference on the Theory and Application of Cryptographic Techniques, 234-238, 1986
3631986
Information theoretic reductions among disclosure problems
G Brassard, C Crepeau, JM Robert
27th Annual Symposium on Foundations of Computer Science (sfcs 1986), 168-173, 1986
2021986
Rogue access point detection in wireless networks
JM Robert, M Barbeau
US Patent 7,716,740, 2010
932010
An optimal algorithm for the (≤ k)-levels, with applications to separation and transversal problems
H Everett, JMR Robert, M Van Kreveld
International Journal of Computational Geometry and Applications 6 (3), 247-261, 1996
73*1996
Worm epidemics in high-speed networks
TM Chen, JM Robert
Computer 37 (6), 48-53, 2004
722004
Flash evaporation of solid state battery component
BO Stimson, WA Hermann, DE Berkstresser, T Holme, A Allenic
US Patent 10,158,115, 2018
672018
The evolution of viruses and worms
TM Chen, JM Robert
Statistical methods in computer security 1, 1-16, 2004
672004
How to reduce your enemy’s information
CH Bennett, G Brassard, JM Robert
Conference on the Theory and Application of Cryptographic Techniques, 468-476, 1985
621985
Quantifying the space-efficiency of 2D graphical representations of trees
MJ McGuffin, JM Robert
Information Visualization 9 (2), 115-140, 2010
602010
Structured peer-to-peer overlay networks: Ideal botnets command and control infrastructures?
CR Davis, S Neville, JM Fernandez, JM Robert, J Mchugh
European Symposium on Research in Computer Security, 461-480, 2008
592008
System and method for detecting abnormal traffic based on early notification
JM Robert, FJN Cosquer
US Patent 7,757,283, 2010
522010
Computational geometry and facility location
JM Robert, G Toussaint
Proc. International Conference on Operations Research and Management Science, 1990
481990
IP Time to Live (TTL) field used as a covert channel
E Jones, O Le Moigne, JM Robert
US Patent 7,415,018, 2008
462008
Smartphone malware detection: From a survey towards taxonomy
A Amamra, C Talhi, JM Robert
2012 7th International Conference on Malicious and Unwanted Software, 79-86, 2012
452012
Statistical methods for detecting TCP SYN flood attacks
JM Robert, B Howard, P Kierstead, SD D'souza
US Patent 7,114,182, 2006
422006
Lower bounds for line stabbing
D Avis, JM Robert, R Wenger
Information processing letters 33 (2), 59-62, 1989
371989
Blind nut
T Makino, N Naito, K Sakoda, S Suzuki
US Patent 10,316,883, 2019
342019
Prover anonymous and deniable distance-bounding authentication
S Gambs, C Onete, JM Robert
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
342014
RBC-OLSR: Reputation-based Clustering OLSR Protocol for Wireless Ad hoc Networks
JM Robert, H Otrok, A Chriqi
Computer Communications, 2011
342011
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20