Related publications (12)

Machine learning based detection of digital documents maliciously recaptured from displays

Touradj Ebrahimi, Evgeniy Upenik, Saleh Gholam Zadeh

We used to say “seeing is believing": this is no longer true. The digitization is changing all aspects of life and business. One of the more noticeable impacts is in how business documents are being authored, exchanged and processed. Many documents such as ...
2020

Self-Recognition in Data Visualization: How Individuals See Themselves in Visual Representations

Dario Rodighiero, Loup Cellard

This article explores how readers recognize their personal identities represented through data visualizations. The recognition is investigated starting from three definitions captured by the philosopher Paul Ricoeur: the identification with the visualizati ...
2019

Enhancing Privacy Protection

Rafik Chaabouni

Privacy has recently gained an importance beyond the field of cryptography. In that regard, the main goal behind this thesis is to enhance privacy protection. All of the necessary mathematical and cryptographic preliminaries are introduced at the start of ...
EPFL2017

Red squirrels in the British Isles are infected with leprosy bacilli

Stewart Cole, Andrej Benjak, Charlotte Avanzi, Philippe Busso, Jérémie Piton, Chloé Marie Loiseau

Leprosy, caused by infection with Mycobacterium leprae or the recently discovered Mycobacterium lepromatosis, was once endemic in humans in the British Isles. Red squirrels in Great Britain (Sciurus vulgaris) have increasingly been observed with leprosy-li ...
American Association for the Advancement of Science2016

Multiculturalism, cosmopolitanism, and making heritage in Malaysia: a view from the historic cities of the Straits of Malacca

Florence Graezer Bideau

Based on the 'universal' values of economic development, democratic governance and cultural diversity promoted by UNESCO, the official policy of the Federation of Malaysia, known as Wawasan 2020 (Vision 2020), promotes modernization with an emphasis on dem ...
Taylor & Francis2012

The Extended Access Control for Machine Readable Travel Documents

Rafik Chaabouni

Machine Readable travel documents have been rapidly put in place since 2004. The initial standard was made by the ICAO and it has been quickly followed by the Extended Access Control (EAC). In this presentation, we discuss about the evolution of these stan ...
2010

The Extended Access Control for Machine Readable Travel Documents

Serge Vaudenay, Rafik Chaabouni

Machine Readable travel documents have been rapidly put in place since 2004. The initial standard was made by the ICAO and it has been quickly followed by the Extended Access Control (EAC). In this paper we discuss about the evolution of these standards an ...
Gesellschaft für Informatik (GI)2009

Secure communication using authenticated channels

Sylvain Pasini

Our main motivation is to design more user-friendly security protocols. Indeed, if the use of the protocol is tedious, most users will not behave correctly and, consequently, security issues occur. An example is the actual behavior of a user in front of an ...
EPFL2009

Efficient Deniable Authentication for Signatures, Application to Machine-Readable Travel Document

Serge Vaudenay, Jean Monnerat, Sylvain Pasini

Releasing a classical digital signature faces to privacy issues. Indeed, there are cases where the prover needs to authenticate some data without making it possible for any malicious verifier to transfer the proof to anyone else. It is for instance the cas ...
Springer Berlin / Heidelberg2009

Privacy of Recent RFID Authentication Protocols

Khaled Ouafi

Privacy is a major concern in RFID systems, especially with widespread deployment of wireless-enabled interconnected personal devices e.g. PDAs and mobile phones, credit cards, e-passports, even clothing and tires. An RFID authentication protocol should no ...
Springer2008

Graph Chatbot

Chat with Graph Search

Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.

DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.