Related publications (123)

On the Theory and Practice of Modern Secure Messaging

Daniel Patrick Collins

Billions of people now have conversations daily over the Internet. A large portion of this communication takes place via secure messaging protocols that offer "end-to-end encryption'" guarantees and resilience to compromise like the widely-used Double Ratc ...
EPFL2024

Private Message Franking with After Opening Privacy

Serge Vaudenay, Iraklis Leontiadis

Recently Grubbs et al. [GLR17] initiated the formal study of message franking protocols. This new type of service launched by Facebook, allows the receiver in a secure messaging application to verifiably report to a third party an abusive message some send ...
2023

impresso Text Reuse at Scale. An interface for the exploration of text reuse data in semantically enriched historical newspapers

Maud Ehrmann, Matteo Romanello

Text Reuse reveals meaningful reiterations of text in large corpora. Humanities researchers use text reuse to study, e.g., the posterior reception of influential texts or to reveal evolving publication practices of historical media. This research is often ...
2023

VIDEZZO: Dependency-aware Virtual Device Fuzzing

Mathias Josef Payer, Flavio Toffalini, Qiang Liu

A virtual machine interacts with its host environment through virtual devices, driven by virtual device messages, e.g., I/O operations. By issuing crafted messages, an adversary can exploit a vulnerability in a virtual device to escape the virtual machine, ...
IEEE COMPUTER SOC2023

KNNs of Semantic Encodings for Rating Prediction

Léo Jules Laugier

This paper explores a novel application of textual semantic similarity to user-preference representation for rating prediction. The approach represents a user's preferences as a graph of textual snippets from review text, where the edges are defined by sem ...
New York2023

Analysis and Improvements of the Sender Keys Protocol for Group Messaging

Daniel Patrick Collins

Messaging between two parties and in the group setting has enjoyed widespread attention both in practice, and, more recently, from the cryptographic community. One of the main challenges in the area is constructing secure (end-to- end encrypted) and effici ...
2022

Geoinformation Harvesting From Social Media Data: A community remote sensing approach

Devis Tuia, Alex Hubertus Levering

As unconventional sources of geoinformation, massive imagery and text messages from open platforms and social media form a temporally quasi-seamless, spatially multiperspective stream, but with unknown and diverse quality. Due to its complementarity to rem ...
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC2022

The effect of spokesperson attribution on public health message sharing during the COVID-19 pandemic

Robert West, Andreas Oliver Spitz, Ahmad Abu-Akel

It is urgent to understand how to effectively communicate public health messages during the COVID-19 pandemic. Previous work has focused on how to formulate messages in terms of style and content, rather than on who should send them. In particular, little ...
2021

Power Yoga: Variable-Stretch Security of CCM for Energy-Efficient Lightweight IoT

Damian Vizár, Reza Reyhanitabar, Emiljano Gjiriti

The currently ongoing NIST LWC project aims at identifying new standardization targets for lightweight authenticated encryption with associated data (AEAD) and (optionally) lightweight cryptographic hashing. NIST has deemed it important for performance and ...
RUHR-UNIV BOCHUM, HORST GORTZ INST IT-SICHERHEIT2021

Absolute Beginners: Living as a Knowledge Worker, from the Parents’ Home to Collective Living

Marson Korbi

A synthesis of the PhD research work on the New Forms of Dwelling (Nuove Forme dell'Abitare), this article traces a short genealogy of the knowledge worker vis-à-vis the history of communal housing. The text discusses three case studies: the campus type, t ...
Jovis2020

Graph Chatbot

Chat with Graph Search

Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.

DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.