A method for watermarking java programs via opaque predicates G Arboit The Fifth International Conference on Electronic Commerce Research (ICECR-5 …, 2002 | 171 | 2002 |
A localized certificate revocation scheme for mobile ad hoc networks G Arboit, C Crépeau, CR Davis, M Maheswaran Ad hoc networks 6 (1), 17-31, 2008 | 115 | 2008 |
BANYAN. IX. The initial mass function and planetary-mass object space density of the TW HYA association J Gagné, JK Faherty, EE Mamajek, L Malo, R Doyon, JC Filippazzo, ... The Astrophysical Journal Supplement Series 228 (2), 18, 2017 | 80 | 2017 |
Near-Infrared Imaging Spectrophotometry of the Gravitational Mirage Q2237+ 0305 D Nadeau, R Racine, R Doyon, G Arboit The Astrophysical Journal 527 (1), 46, 1999 | 7 | 1999 |
Two mathematical security aspects of the RSA cryptosystem: signature padding schemes and key generation with a backdoor G Arboit McGill University, 2008 | 4 | 2008 |
From fixed-length messages to arbitrary-length messages practical RSA signature padding schemes G Arboit1, JM Robert Topics in Cryptology—CT-RSA 2001: The Cryptographers’ Track at RSA …, 2001 | 3 | 2001 |