Related courses (13)
COM-401: Cryptography and security
This course introduces the basics of cryptography. We review several types of cryptographic primitives, when it is safe to use them and how to select the appropriate security parameters. We detail how
COM-402: Information security and privacy
This course provides an overview of information security and privacy topics. It introduces students to the knowledge and tools they will need to deal with the security/privacy challenges they are like
COM-301: Computer security and privacy
This is an introductory course to computer security and privacy. Its goal is to provide students with means to reason about security and privacy problems, and provide them with tools to confront them.
CS-487: Industrial automation
This course consists of two parts:
  1. architecture of automation systems, hands-on lab
  2. dependable systems and handling of faults and failures in real-time systems, including fault-tolerant computin
CH-250: Mathematical methods in chemistry
This course consists of two parts. The first part covers basic concepts of molecular symmetry and the application of group theory to describe it. The second part introduces Laplace transforms and Four
COM-506: Student seminar: security protocols and applications
This seminar introduces the participants to the current trends, problems, and methods in the area of communication security.
EE-552: Media security
This course provides attendees with theoretical and practical issues in media security. In addition to lectures by the professor, the course includes laboratory sessions, a mini-project, and a mid-ter
CH-335: Asymmetric synthesis and retrosynthesis
La première partie du cours décrit les méthodes classiques de synthèse asymétrique. La seconde partie du cours traite des stratégies de rétrosynthèse basées sur l'approche par disconnection.
MGT-621: Microeconomics
This course presents a first introduction to microeconomic theory and its applications. It lays the foundation for more advanced courses.
MGT-602: Mathematical models in supply chain management
Over the past decade, supply chain management has drawn enormous attention by industry and academia alike. Given an increasingly global economy, pronounced trends towards outsourcing and advances in i

Graph Chatbot

Chat with Graph Search

Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.

DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.