Related publications (18)

Secure Contactless Payment

Serge Vaudenay, Handan Kilinç Alper

A contactless payment lets a card holder execute payment without any interaction (e.g., entering PIN or signing) between the terminal and the card holder. Even though the security is the first priority in a payment system, the formal security model of cont ...
2018

Information Gathering with Peers: Submodular Optimization with Peer-Prediction Constraints

Boi Faltings, Andreas Krause, Goran Radanovic

We study a problem of optimal information gathering from multiple data providers that need to be incentivized to provide accurate information. This problem arises in many real world applications that rely on crowdsourced data sets, but where the process of ...
ASSOC ADVANCEMENT ARTIFICIAL INTELLIGENCE2018

Security of Distance-Bounding: A Survey

Serge Vaudenay, Gildas Avoine, Martin Benjamin, Srdan Capkun, Aslan Tchamkerten

Distance-bounding protocols allow a verifier to both authenticate a prover and evaluate whether the latter is located in his vicinity. These protocols are of particular interest in contactless systems, e.g. electronic payment or access control systems, whi ...
2018

Implications of Position in Cryptography

Handan Kilinç Alper

In our daily lives, people or devices frequently need to learn their location for many reasons as some services depend on the absolute location or the proximity. The outcomes of positioning systems can have critical effects e.g., on military, emergency. Th ...
EPFL2018

Payment Size, Negative Equity, and Mortgage Default

Andreas Fuster

This paper studies the treatment effect of monthly payment size on mortgage default, using a sample of adjustable-rate loans that experienced large payment reductions thanks to the recent low interest rate environment. Payment size has an economically larg ...
2017

Location choice with longitudinal WiFi data

Michel Bierlaire, Matthieu Marie Cochon de Lapparent, Antonin Danalet, Loïc Tinguely

Location-aware data collection technologies provide new insights about location choices. Only a few dynamic models of location choice exist in scientific literature. To our knowledge, none of them correct for serial correlation. In this paper, we model cho ...
University of Leeds2016

Private and Secure Public-Key Distance Bounding: Application to NFC Payment

Serge Vaudenay

Distance-Bounding is used to defeat relay attacks. For wireless payment systems, the payment terminal is not always online. So, the protocol must rely on a public key for the prover (payer). We propose a generic transformation of a (weakly secure) symmetri ...
Springer2015

Location choice with longitudinal WiFi data

Michel Bierlaire, Matthieu Marie Cochon de Lapparent, Antonin Danalet, Loïc Tinguely

While moving from diary survey to location-aware technologies, recent data collection techniques provide new insights about location choices. Only few dynamic models of location choice exist in the literature, and none of them to our knowledge correct for ...
Transport and Mobility Laboratory, ENAC, EPFL2015

Destination choice with longitudinal data

Michel Bierlaire, Matthieu Marie Cochon de Lapparent, Antonin Danalet, Loïc Tinguely

Panel data and habits are often observed in travel behavior research, in route choice and car ownership. While moving from diary survey to location-aware technologies, recent data collection techniques provide panel data about location choice. Only few dyn ...
2015

Activity choice modeling for pedestrian facilities

Antonin Danalet

This thesis develops models of activity and destination choices in pedestrian facilities from WiFi traces. We adapt the activity-based travel demand analysis of urban mobility to pedestrians and to digital footprints. We are interested in understanding the ...
EPFL2015

Graph Chatbot

Chat with Graph Search

Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.

DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.