Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
Like many other enterprises, humanitarian organizations are investing in their digital transformation. In this sector, an important effort is put into biometric solutions. The ICRC has been exploring new ways of how they could integrate biometrics into the ...
We study the admissibility problem in multivariate algebraic systems, such as ac electrical networks, where the power injection is quadratic in the state. The goal of such systems is to ensure that the state stays in some security set (e.g., magnitudes of ...
Secure asynchronous two-party communication applies ratcheting to strengthen privacy, in the presence of internal state exposures. Security with ratcheting is provided in two forms: forward security and post-compromise security. There have been several suc ...
Certain organisms including species of mollusks, polychaetes, onychophorans and arthropods produce exceptional polymeric materials outside their bodies under ambient conditions using concentrated fluid protein precursors. While much is understood about the ...
Synthetic biology is a field of biotechnology that is rapidly growing in various applications, such as in medicine, environmental sustainability, and energy production. However these technologies also have unforeseen risks and applications to humans and th ...
The QC-MDPC code-based KEM BIKE is one of the Round-3 candidates of the NIST PQC standardization project. Its Round-2 specification document described variants claiming to have IND-CCA security. The security proof used the Fujisaki-Okamoto transformation a ...
CMOS Single-Photon Avalanche Diodes (SPADs) have broken into the mainstream by enabling the adoption of imaging, timing, and security technologies in a variety of applications within the consumer, medical and industrial domains. The continued scaling of te ...
The need for efficient, widespread and reliable security and user privacy technologies is important more so than ever before. This is in particular crucial for workflows involving image data. Images can be easily edited to give a false impression of realit ...
Editor's notes: The cross-layer approach presented in this article involves co-designing a feedback controller's parameters together with the schedule of an Ethernet network used for communicating state information and control signals.-Samarjit Chakraborty ...
This article has been retracted due to a breach in confidentiality. The confidential information has been redacted to protect the privacy of those involved. The authors have been invited to re-submit a modified version of their manuscript for publication. ...