Follow
Jean-Marc Robert
Jean-Marc Robert
Professor of information Technology, ETS
Verified email at etsmtl.ca
Title
Cited by
Cited by
Year
Privacy amplification by public discussion
CH Bennett, G Brassard, JM Robert
SIAM journal on Computing 17 (2), 210-229, 1988
12961988
All-or-nothing disclosure of secrets
G Brassard, C Crépeau, JM Robert
Conference on the Theory and Application of Cryptographic Techniques, 234-238, 1986
4791986
Information theoretic reductions among disclosure problems
G Brassard, C Crépeau, JM Robert
27th Annual Symposium on Foundations of Computer Science (sfcs 1986), 168-173, 1986
2521986
The evolution of viruses and worms
TM Chen, JM Robert
Statistical methods in computer security, 289-310, 2004
1172004
Rogue access point detection in wireless networks
JM Robert, M Barbeau
US Patent 7,716,740, 2010
1072010
Application of cut-sets to network interdependency security risk assessment
D Wiemer, JM Robert, B McFarlane, C Gustave, S Chow, J Tang
US Patent App. 11/232,004, 2007
1062007
Quantifying the space-efficiency of 2D graphical representations of trees
MJ McGuffin, JM Robert
Information Visualization 9 (2), 115-140, 2010
882010
An optimal algorithm for the (≤ k)-levels, with applications to separation and transversal problems
H Everett, JMR Robert, M Van Kreveld
International Journal of Computational Geometry and Applications 6 (3), 247-261, 1996
88*1996
Worm epidemics in high-speed networks
TM Chen, JM Robert
Computer 37 (6), 48-53, 2004
842004
An efficient approach to detect torrentlocker ransomware in computer systems
F Mbol, JM Robert, A Sadighian
Cryptology and Network Security: 15th International Conference, CANS 2016 …, 2016
722016
System and method for detecting abnormal traffic based on early notification
JM Robert, FJN Cosquer
US Patent 7,757,283, 2010
692010
Smartphone malware detection: From a survey towards taxonomy
A Amamra, C Talhi, JM Robert
2012 7th International Conference on Malicious and Unwanted Software, 79-86, 2012
682012
Structured peer-to-peer overlay networks: Ideal botnets command and control infrastructures?
CR Davis, S Neville, JM Fernandez, JM Robert, J McHugh
Computer Security-ESORICS 2008: 13th European Symposium on Research in …, 2008
652008
IP Time to Live (TTL) field used as a covert channel
E Jones, O Le Moigne, JM Robert
US Patent 7,415,018, 2008
602008
Computational geometry and facility location
JM Robert, G Toussaint
561990
A terrorist-fraud resistant and extractor-free anonymous distance-bounding protocol
G Avoine, X Bultel, S Gambs, D Gérault, P Lafourcade, C Onete, ...
Proceedings of the 2017 ACM on Asia conference on computer and …, 2017
502017
Containment mechanism for potentially contaminated end systems
STH Chow, JM Robert, K McNamee, D Wiemer, BK McFarlane
US Patent 8,020,207, 2011
502011
Prover anonymous and deniable distance-bounding authentication
S Gambs, C Onete, JM Robert
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
462014
Mechanism for tracing back anonymous network flows in autonomous systems
E Jones, JM Robert
US Patent 7,565,426, 2009
442009
RBC-OLSR: Reputation-based Clustering OLSR Protocol for Wireless Ad hoc Networks
JM Robert, H Otrok, A Chriqi
Computer Communications, 2011
392011
The system can't perform the operation now. Try again later.
Articles 1–20