Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
So far, research on mobile ad hoc networks has been focused primarily on routing issues. Security, on the other hand, has been given a lower priority. This paper provides an overview of security problems for mobile ad hoc networks, distinguishing the threa ...
The Telecommunications Information Networking Architecture (TINA) provides the architectural basis for the realization of telecommunications services as distributed applications. In particular application of distributed systems, new security problems arise ...
Recently, some collisions have been exposed for a variety of cryptographic hash functions including some of the most widely used today. Many other hash functions using similar constructions can however still be considered secure. Nevertheless, this has dra ...
Price dynamics are studied in a dataset of more than 11,000 transactions from large-scale financial markets experiments with multiple risky securities. The aim is to determine whether a few simple principles govern equilibration. We first ask whether price ...
The article is concerned with security problems in the TINA architecture. It presents a structuring of this complex problem domain and proposes the architectural embedding of security services and mechanisms, mainly as part of the DPE. For this purpose, CO ...
The exchange of goods conducted face-to-face between two parties dates back to before the beginning of recorded history. Traditional means of payment have always had security problems, but now electronic payments retain the same drawbacks and add some risk ...
This poster will describe the security problems of the emerging vehicular networks. It will also outline the solution architecture and several of its components. ...
Inter-Vehicular Communications (IVC) are a cornerstone of the future intelligent transportation systems. A crucial enabling component of IVC is its security and privacy. Indeed, as vehicular computing systems become interconnected, there will be new venues ...
In this paper, we propose an adaptive risk-based replanning strategy in the context of multi-robot task allocation for dealing with limitations of local perception and unpredicted human behavior. Our replanning method is based on the variations of social r ...