Privacy amplification by public discussion CH Bennett, G Brassard, JM Robert SIAM journal on Computing 17 (2), 210-229, 1988 | 1266 | 1988 |
All-or-nothing disclosure of secrets G Brassard, C Crépeau, JM Robert Conference on the Theory and Application of Cryptographic Techniques, 234-238, 1986 | 461 | 1986 |
Information theoretic reductions among disclosure problems G Brassard, C Crépeau, JM Robert 27th Annual Symposium on Foundations of Computer Science (sfcs 1986), 168-173, 1986 | 246 | 1986 |
The evolution of viruses and worms TM Chen, JM Robert Statistical methods in computer security, 289-310, 2004 | 115 | 2004 |
Rogue access point detection in wireless networks JM Robert, M Barbeau US Patent 7,716,740, 2010 | 107 | 2010 |
Application of cut-sets to network interdependency security risk assessment D Wiemer, JM Robert, B McFarlane, C Gustave, S Chow, J Tang US Patent App. 11/232,004, 2007 | 98 | 2007 |
Quantifying the space-efficiency of 2D graphical representations of trees MJ McGuffin, JM Robert Information Visualization 9 (2), 115-140, 2010 | 91 | 2010 |
Worm epidemics in high-speed networks TM Chen, JM Robert Computer 37 (6), 48-53, 2004 | 84 | 2004 |
An optimal algorithm for the (≤ k)-levels, with applications to separation and transversal problems H Everett, JMR Robert, M Van Kreveld International Journal of Computational Geometry and Applications 6 (3), 247-261, 1996 | 83* | 1996 |
System and method for detecting abnormal traffic based on early notification JM Robert, FJN Cosquer US Patent 7,757,283, 2010 | 68 | 2010 |
An efficient approach to detect torrentlocker ransomware in computer systems F Mbol, JM Robert, A Sadighian Cryptology and Network Security: 15th International Conference, CANS 2016 …, 2016 | 66 | 2016 |
Structured peer-to-peer overlay networks: Ideal botnets command and control infrastructures? CR Davis, S Neville, JM Fernandez, JM Robert, J McHugh Computer Security-ESORICS 2008: 13th European Symposium on Research in …, 2008 | 65 | 2008 |
Smartphone malware detection: From a survey towards taxonomy A Amamra, C Talhi, JM Robert 2012 7th International Conference on Malicious and Unwanted Software, 79-86, 2012 | 61 | 2012 |
IP Time to Live (TTL) field used as a covert channel E Jones, O Le Moigne, JM Robert US Patent 7,415,018, 2008 | 59 | 2008 |
Computational geometry and facility location JM Robert, G Toussaint | 58 | 1990 |
Containment mechanism for potentially contaminated end systems STH Chow, JM Robert, K McNamee, D Wiemer, BK McFarlane US Patent 8,020,207, 2011 | 48 | 2011 |
A terrorist-fraud resistant and extractor-free anonymous distance-bounding protocol G Avoine, X Bultel, S Gambs, D Gérault, P Lafourcade, C Onete, ... Proceedings of the 2017 ACM on Asia conference on computer and …, 2017 | 46 | 2017 |
Prover anonymous and deniable distance-bounding authentication S Gambs, C Onete, JM Robert Proceedings of the 9th ACM symposium on Information, computer and …, 2014 | 43 | 2014 |
Mechanism for tracing back anonymous network flows in autonomous systems E Jones, JM Robert US Patent 7,565,426, 2009 | 43 | 2009 |
IP traceback solutions based on time to live covert channel E Jones, O Le Moigne, JM Robert Proceedings. 2004 12th IEEE International Conference on Networks (ICON 2004 …, 2004 | 38 | 2004 |