Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
We propose an efficient remote biometric authentication protocol that gives strong protection to the user’s biometric data in case of two common kinds of security breaches: (1) loss or theft of the user’s token (smart card, handheld device, etc.), giving t ...
Urban commuting data has long been a vital source of understanding population mobility behaviour and has been widely adopted for various applications such as transport infrastructure planning and urban anomaly detection. While individual-specific transacti ...
Humanitarian aid-distribution programs help bring physical goods to people in need. Traditional paper-based solutions to support aid distribution do not scale to large populations and are hard to secure. Existing digital solutions solve these issues, at th ...
Automobiles have become counter-productive. Negative externalities resulting from car use have overcome the social benefits automobiles brought when initially introduced. Having shaped most contemporary transportation systems, the automobility regime is kn ...
In our daily lives, people or devices frequently need to learn their location for many reasons as some services depend on the absolute location or the proximity. The outcomes of positioning systems can have critical effects e.g., on military, emergency. Th ...
Contactless power transfer using inductive coupling is a well-known way to transfer energy from a transmitter to a receiver without any physical link. The applications are multiple. In this paper, the design and control of such a system for a contactless b ...
Contactless access control systems are critical for security but often vulnerable to relay attacks. In this paper, we define an integrated security and privacy model for access control using distance bounding (DB) which is the most robust solution to preve ...
Over the course of the last ten years, the urban population in the Global South has grown at a rate of 1.2 million people per week, putting the developing countries at the center of the urban development in 21st century. This rapid urbanization resulted in ...
Nowadays, there is a very high number of electronic devices with different ranges of power. Desktop peripherals and cellphones are an example of widely used low power devices. Contactless power transfer is useful to supply or recharge these devices without ...
This study aimed to investigate the performance of an updated version of our pre-impact detection algorithm parsing out the output of a set of Inertial Measurement Units (IMUs) placed on lower limbs and designed to recognize signs of lack of balance due to ...