Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
We propose HELEN, a code-based public-key cryptosystem whose security is based on the hardness of the Learning from Parity with Noise problem (LPN) and the decisional minimum distance problem. We show that the resulting cryptosystem achieves indistinguisha ...
It is important in biometric person recognition systems to protect personal data and privacy of users. This paper introduces a new mechanism to revoke and protect fingerprint minutiae information, which can be used in today’s security-aware society. The re ...
Multiple techniques are presented to implement an ultra-low-power remotely powered implantable system. The temperature is monitored locally by a thermistor-type sensor. The resistive response of the sensor is amplified and resolved in the time-domain. The ...
In real time scenario, transmission (of power) in power systems may not be always ideal i.e. they may be interrupted. As a result, the synchronization among the power generating modules may be lost. Loss of synchronization has a direct effect on the stabil ...
In real time scenario, transmission (of power) in power systems may not be always ideal i.e. they may be interrupted. As a result, the synchronization among the power generating modules may be lost. Loss of synchronization has a direct effect on the stabil ...
The reserve is a service traded in the market to counteract unpredictable changes in system conditions. The efficient market-clearing procedure relies on economic criteria while maintaining the system security by means of a proper reserve management progra ...
This survey provides a structured and comprehensive overview of the research contributions that analyze and solve security and privacy problems in computer networks by game-theoretic approaches. A selected set of works are presented to highlight the applic ...
The modern computing landscape contains an increasing number of app ecosystems, where users store personal data on platforms such as Facebook or smartphones. APIs enable third-party applications (apps) to utilize that data. A key concern associated with ap ...
Quite recently, distance-bounding protocols received a lot of attention as they offer a good solution to thwart relay attacks. Their security models at still unstable, especially when considering terrorist fraud. This considers the case where a malicious p ...
Current security systems often rely on the adversary's computational limitations. Wireless networks offer the opportunity for a different, complementary kind of security, which relies on the adversary's limited network presence (i.e., that the adversary ca ...