Jean-Yves

Results: 339



#Item
61

Traps and Pitfalls of Using Contact Traces in Performance Studies of Opportunistic Networks Nikodin Ristanovic, George Theodorakopoulos and Jean-Yves Le Boudec EPFL, School of Computer and Communication Sciences, Switzer

Add to Reading List

Source URL: users.cs.cf.ac.uk

Language: English - Date: 2012-09-20 10:50:20
    62

    1 Selfish Response to Epidemic Propagation George Theodorakopoulos, Jean-Yves Le Boudec, Fellow, IEEE, and John S. Baras, Fellow, IEEE IEEE Transactions on Automatic Control, vol.58, no.2, pp, February 2013 Abst

    Add to Reading List

    Source URL: users.cs.cf.ac.uk

    Language: English - Date: 2013-01-22 12:59:11
      63

      Protecting Location Privacy: Optimal Strategy against Localization Attacks Reza Shokri† , George Theodorakopoulos‡ , Carmela Troncoso∗ , Jean-Pierre Hubaux† , and Jean-Yves Le Boudec† †

      Add to Reading List

      Source URL: www.shokri.org

      Language: English - Date: 2015-05-28 18:53:03
        64

        Expressiveness + Automation + Soundness: Towards Combining SMT Solvers and Interactive Proof Assistants Pascal Fontaine, Jean-Yves Marion, Stephan Merz, Leonor Prensa Nieto, and Alwen Tiu LORIA – INRIA Lorraine – Uni

        Add to Reading List

        Source URL: www.montefiore.ulg.ac.be

        Language: English - Date: 2006-01-07 06:25:43
          65

          Quantifying Location Privacy: The Case of Sporadic Location Exposure Reza Shokri1 , George Theodorakopoulos1, George Danezis2 , Jean-Pierre Hubaux1 , and Jean-Yves Le Boudec1 1 2

          Add to Reading List

          Source URL: www.shokri.org

          Language: English - Date: 2015-05-28 18:53:41
            66

            Hybrid Meta-art Essays Georges Aperghis, Jean-Claude Moineau, Claude Portail & Yves Charnay mixed with elements by Paul Campese, Alfred Bester & Tim Gaze remixes by Tim Gaze

            Add to Reading List

            Source URL: avance.randomflux.info

            - Date: 2013-08-15 04:44:50
              67

              1 Adaptive Message Authentication for Multi-Hop Networks Nikodin Ristanovic1 , Panos Papadimitratos2 , George Theodorakopoulos1 , Jean-Pierre Hubaux1 and Jean-Yves Le Boudec1

              Add to Reading List

              Source URL: users.cs.cf.ac.uk

              Language: English - Date: 2012-09-20 10:46:31
                68

                Prolonging the Hide-and-Seek Game: Optimal Trajectory Privacy for Location-Based Services George Theodorakopoulos1 , Reza Shokri2 , Carmela Troncoso3 , Jean-Pierre Hubaux4 and Jean-Yves Le Boudec4 1

                Add to Reading List

                Source URL: users.cs.cf.ac.uk

                Language: English - Date: 2014-09-08 07:44:47
                  69

                  Prolonging the Hide-and-Seek Game: Optimal Trajectory Privacy for Location-Based Services George Theodorakopoulos1 , Reza Shokri2 , Carmela Troncoso3 , Jean-Pierre Hubaux4 and Jean-Yves Le Boudec4 1

                  Add to Reading List

                  Source URL: www.shokri.org

                  Language: English - Date: 2014-09-08 02:43:19
                    70

                    2011 IEEE Symposium on Security and Privacy Quantifying Location Privacy Reza Shokri, George Theodorakopoulos, Jean-Yves Le Boudec, and Jean-Pierre Hubaux LCA, EPFL, Lausanne, Switzerland

                    Add to Reading List

                    Source URL: www.shokri.org

                    Language: English - Date: 2015-05-28 18:53:56
                      UPDATE