Follow
Jean-Marc Robert
Jean-Marc Robert
Professor of information Technology, ETS
Verified email at etsmtl.ca
Title
Cited by
Cited by
Year
Privacy amplification by public discussion
CH Bennett, G Brassard, JM Robert
SIAM journal on Computing 17 (2), 210-229, 1988
12421988
All-or-nothing disclosure of secrets
G Brassard, C Crépeau, JM Robert
Conference on the Theory and Application of Cryptographic Techniques, 234-238, 1986
4501986
Information theoretic reductions among disclosure problems
G Brassard, C Crépeau, JM Robert
27th Annual Symposium on Foundations of Computer Science (sfcs 1986), 168-173, 1986
2481986
The evolution of viruses and worms
TM Chen, JM Robert
Statistical methods in computer security 1 (16), 2004
1112004
Rogue access point detection in wireless networks
JM Robert, M Barbeau
US Patent 7,716,740, 2010
1052010
Application of cut-sets to network interdependency security risk assessment
D Wiemer, JM Robert, B McFarlane, C Gustave, S Chow, J Tang
US Patent App. 11/232,004, 2007
942007
Quantifying the space-efficiency of 2D graphical representations of trees
MJ McGuffin, JM Robert
Information Visualization 9 (2), 115-140, 2010
882010
Worm epidemics in high-speed networks
TM Chen, JM Robert
Computer 37 (6), 48-53, 2004
842004
An optimal algorithm for the (≤ k)-levels, with applications to separation and transversal problems
H Everett, JMR Robert, M Van Kreveld
International Journal of Computational Geometry and Applications 6 (3), 247-261, 1996
84*1996
System and method for detecting abnormal traffic based on early notification
JM Robert, FJN Cosquer
US Patent 7,757,283, 2010
672010
An efficient approach to detect torrentlocker ransomware in computer systems
F Mbol, JM Robert, A Sadighian
Cryptology and Network Security: 15th International Conference, CANS 2016 …, 2016
652016
Structured peer-to-peer overlay networks: Ideal botnets command and control infrastructures?
CR Davis, S Neville, JM Fernandez, JM Robert, J McHugh
Computer Security-ESORICS 2008: 13th European Symposium on Research in …, 2008
652008
Smartphone malware detection: From a survey towards taxonomy
A Amamra, C Talhi, JM Robert
2012 7th International Conference on Malicious and Unwanted Software, 79-86, 2012
622012
Computational geometry and facility location
JM Robert, G Toussaint
591990
IP Time to Live (TTL) field used as a covert channel
E Jones, O Le Moigne, JM Robert
US Patent 7,415,018, 2008
582008
Containment mechanism for potentially contaminated end systems
STH Chow, JM Robert, K McNamee, D Wiemer, BK McFarlane
US Patent 8,020,207, 2011
452011
A terrorist-fraud resistant and extractor-free anonymous distance-bounding protocol
G Avoine, X Bultel, S Gambs, D Gérault, P Lafourcade, C Onete, ...
Proceedings of the 2017 ACM on Asia conference on computer and …, 2017
442017
Mechanism for tracing back anonymous network flows in autonomous systems
E Jones, JM Robert
US Patent 7,565,426, 2009
432009
Prover anonymous and deniable distance-bounding authentication
S Gambs, C Onete, JM Robert
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
422014
Lower bounds for line stabbing
D Avis, JM Robert, R Wenger
Information processing letters 33 (2), 59-62, 1989
391989
The system can't perform the operation now. Try again later.
Articles 1–20