Jean-Marie Le Bars

According to our database1, Jean-Marie Le Bars authored at least 30 papers between 1998 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
A semantic approach for comparing Fog Service Placement Problems.
Proceedings of the 17th IFIP/IEEE International Symposium on Integrated Network Management, 2021

2020
On the computation of the Möbius transform.
Theor. Comput. Sci., 2020

Logical Attacks and Countermeasures for Fingerprint On-Card-Comparison Systems.
Sensors, 2020

Applied graph theory to security: A qualitative placement of security solutions within IoT networks.
J. Inf. Secur. Appl., 2020

On the computation of the M{ö}bius transform.
CoRR, 2020

2019
Performance of Password Guessing Enumerators Under Cracking Conditions.
Proceedings of the ICT Systems Security and Privacy Protection, 2019

Placement optimization of IoT security solutions for edge computing based on graph theory.
Proceedings of the 38th IEEE International Performance Computing and Communications Conference, 2019

2018
Towards an Optimal Template Reduction for Securing Embedded Fingerprint Devices.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

Comparative Study of Digital Fingerprint Quality Assessment Metrics.
Proceedings of the 2018 International Conference on Biometrics, 2018

2017
Fingerprint Class Recognition for Securing EMV Transaction.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

2016
Literature review of fingerprint quality assessment and its evaluation.
IET Biom., 2016

In What Way Is It Possible to Impersonate You Bypassing Fingerprint Sensors?
Proceedings of the 2016 International Conference of the Biometrics Special Interest Group, 2016

Quelques études de l'aléatoire en informatique.
, 2016

2015
Properties and constructions of coincident functions.
CoRR, 2015

Image Watermaking With Biometric Data For Copyright Protection.
CoRR, 2015

Comparative study of minutiae selection algorithms for ISO fingerprint templates.
Proceedings of the Media Watermarking, 2015

Fingerprint Quality Assessment Combining Blind Image Quality, Texture and Minutiae Features.
Proceedings of the ICISSP 2015, 2015

Quality Assessment of Fingerprints with Minutiae Delaunay Triangulation.
Proceedings of the ICISSP 2015, 2015

EvaBio a New Modular Platform to Evaluate Biometric System.
Proceedings of the Information Systems Security and Privacy, 2015

EvaBio Platform for the Evaluation Biometric System - Application to the Optimization of the Enrollment Process for Fingerprints Devices.
Proceedings of the ICISSP 2015, 2015

Fingerprint Quality Assessment with Multiple Segmentation.
Proceedings of the International Conference on Cyberworlds, 2015

Image Watermarking with Biometric Data for Copyright Protection.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2013
Enumerative encoding of correlation-immune Boolean functions.
Theor. Comput. Sci., 2013

2010
Equivalence classes of Boolean functions for first-order correlation.
IEEE Trans. Inf. Theory, 2010

2008
A Novel Framework for Watermarking: The Data-Abstracted Approach.
Proceedings of the Advances in Information and Computer Security, 2008

2004
Generating Functions For Kernels of Digraphs (Enumeration & Asymptotics for Nim Games)
CoRR, 2004

2002
The 0-1 law fails for frame satisfiability of propositional modal logic.
Proceedings of the 17th IEEE Symposium on Logic in Computer Science (LICS 2002), 2002

2001
The 0-1 law fails for monadic existential second-order logic on undirected graphs.
Inf. Process. Lett., 2001

2000
Counterexamples of the 0-1 law for fragments of existential second-order logic: an overview.
Bull. Symb. Log., 2000

1998
Fragments of Existential Second-Order Logic without 0-1 Laws.
Proceedings of the Thirteenth Annual IEEE Symposium on Logic in Computer Science, 1998


  Loading...