default search action
Jean-Marie Le Bars
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]Benoît Vibert, Jean-Marie Le Bars, Christophe Charrier, Christophe Rosenberger:
Comparative study of minutiae selection methods for digital fingerprints. Frontiers Big Data 6 (2024) - [c20]Sara Majbour, Morgan Barbier, Jean-Marie Le Bars:
Fuzzy Vault Security Enhancement Avoid Statistical Biases. SECRYPT 2024: 40-51 - 2021
- [c19]Tanguy Godquin, Morgan Barbier, Chrystel Gaber, Jean-Luc Grimault, Jean-Marie Le Bars:
A semantic approach for comparing Fog Service Placement Problems. IM 2021: 682-686 - 2020
- [j8]Tanguy Godquin, Morgan Barbier, Chrystel Gaber, Jean-Luc Grimault, Jean-Marie Le Bars:
Applied graph theory to security: A qualitative placement of security solutions within IoT networks. J. Inf. Secur. Appl. 55: 102640 (2020) - [j7]Benoît Vibert, Jean-Marie Le Bars, Christophe Charrier, Christophe Rosenberger:
Logical Attacks and Countermeasures for Fingerprint On-Card-Comparison Systems. Sensors 20(18): 5410 (2020) - [j6]Morgan Barbier, Hayat Cheballah, Jean-Marie Le Bars:
On the computation of the Möbius transform. Theor. Comput. Sci. 809: 171-188 (2020) - [i4]Morgan Barbier, Hayat Cheballah, Jean-Marie Le Bars:
On the computation of the M{ö}bius transform. CoRR abs/2004.11146 (2020)
2010 – 2019
- 2019
- [c18]Tanguy Godquin, Morgan Barbier, Chrystel Gaber, Jean-Luc Grimault, Jean-Marie Le Bars:
Placement optimization of IoT security solutions for edge computing based on graph theory. IPCCC 2019: 1-7 - [c17]Mathieu Valois, Patrick Lacharme, Jean-Marie Le Bars:
Performance of Password Guessing Enumerators Under Cracking Conditions. SEC 2019: 67-80 - 2018
- [c16]Zhigang Yao, Jean-Marie Le Bars, Christophe Charrier, Christophe Rosenberger:
Comparative Study of Digital Fingerprint Quality Assessment Metrics. ICB 2018: 17-22 - [c15]Benoît Vibert, Christophe Charrier, Jean-Marie Le Bars, Christophe Rosenberger:
Towards an Optimal Template Reduction for Securing Embedded Fingerprint Devices. ICISSP 2018: 329-336 - 2017
- [c14]Benoît Vibert, Jean-Marie Le Bars, Christophe Rosenberger, Christophe Charrier:
Fingerprint Class Recognition for Securing EMV Transaction. ICISSP 2017: 403-410 - 2016
- [b1]Jean-Marie Le Bars:
Quelques études de l'aléatoire en informatique. Normandy University, France, 2016 - [j5]Zhigang Yao, Jean-Marie Le Bars, Christophe Charrier, Christophe Rosenberger:
Literature review of fingerprint quality assessment and its evaluation. IET Biom. 5(3): 243-251 (2016) - [c13]Benoît Vibert, Jean-Marie Le Bars, Christophe Charrier, Christophe Rosenberger:
In What Way Is It Possible to Impersonate You Bypassing Fingerprint Sensors? BIOSIG 2016: 377-384 - 2015
- [c12]Morgan Barbier, Jean-Marie Le Bars, Christophe Rosenberger:
Image Watermarking with Biometric Data for Copyright Protection. ARES 2015: 618-625 - [c11]Zhigang Yao, Jean-Marie Le Bars, Christophe Charrier, Christophe Rosenberger:
Fingerprint Quality Assessment with Multiple Segmentation. CW 2015: 345-350 - [c10]Benoît Vibert, Zhigang Yao, Sylvain Vernois, Jean-Marie Le Bars, Christophe Charrier, Christophe Rosenberger:
EvaBio a New Modular Platform to Evaluate Biometric System. ICISSP (Revised Selected Papers) 2015: 234-250 - [c9]Zhigang Yao, Jean-Marie Le Bars, Christophe Charrier, Christophe Rosenberger:
Quality Assessment of Fingerprints with Minutiae Delaunay Triangulation. ICISSP 2015: 315-321 - [c8]Benoît Vibert, Zhigang Yao, Sylvain Vernois, Jean-Marie Le Bars, Christophe Charrier, Christophe Rosenberger:
EvaBio Platform for the Evaluation Biometric System - Application to the Optimization of the Enrollment Process for Fingerprints Devices. ICISSP 2015: 329-335 - [c7]Zhigang Yao, Jean-Marie Le Bars, Christophe Charrier, Christophe Rosenberger:
Fingerprint Quality Assessment Combining Blind Image Quality, Texture and Minutiae Features. ICISSP 2015: 336-343 - [c6]Benoît Vibert, Christophe Charrier, Jean-Marie Le Bars, Christophe Rosenberger:
Comparative study of minutiae selection algorithms for ISO fingerprint templates. Media Watermarking, Security, and Forensics 2015: 94090C - [i3]Morgan Barbier, Jean-Marie Le Bars, Christophe Rosenberger:
Image Watermaking With Biometric Data For Copyright Protection. CoRR abs/1503.04624 (2015) - [i2]Morgan Barbier, Hayat Cheballah, Jean-Marie Le Bars:
Properties and constructions of coincident functions. CoRR abs/1507.05316 (2015) - 2013
- [j4]Nicolás Carrasco, Jean-Marie Le Bars, Alfredo Viola:
Enumerative encoding of correlation-immune Boolean functions. Theor. Comput. Sci. 487: 23-36 (2013) - 2011
- [c5]Nicolás Carrasco, Jean-Marie Le Bars, Alfredo Viola:
Enumerative encoding of correlation immune Boolean functions. ITW 2011: 643-647 - 2010
- [j3]Jean-Marie Le Bars, Alfredo Viola:
Equivalence classes of Boolean functions for first-order correlation. IEEE Trans. Inf. Theory 56(3): 1247-1261 (2010)
2000 – 2009
- 2008
- [c4]Cyril Bazin, Jean-Marie Le Bars, Jacques Madelaine:
A Novel Framework for Watermarking: The Data-Abstracted Approach. IWSEC 2008: 201-217 - 2007
- [c3]Jean-Marie Le Bars, Alfredo Viola:
Equivalence classes of boolean functions for first-order correlation. ISIT 2007: 181-185 - 2004
- [i1]Cyril Banderier, Jean-Marie Le Bars, Vlady Ravelomanana:
Generating Functions For Kernels of Digraphs (Enumeration & Asymptotics for Nim Games). CoRR math.CO/0411138 (2004) - 2002
- [c2]Jean-Marie Le Bars:
The 0-1 law fails for frame satisfiability of propositional modal logic. LICS 2002: 225-234 - 2001
- [j2]Jean-Marie Le Bars:
The 0-1 law fails for monadic existential second-order logic on undirected graphs. Inf. Process. Lett. 77(1): 43-48 (2001) - 2000
- [j1]Jean-Marie Le Bars:
Counterexamples of the 0-1 law for fragments of existential second-order logic: an overview. Bull. Symb. Log. 6(1): 67-82 (2000)
1990 – 1999
- 1998
- [c1]Jean-Marie Le Bars:
Fragments of Existential Second-Order Logic without 0-1 Laws. LICS 1998: 525-536
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-07 00:58 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint