Related publications (18)

Policy analysis during socio-technical energy transitions: three essays on the Swiss electricity sector

Paul Adrianus Van Baal

Global energy systems are changing rapidly. This energy transition complicates the use of traditional policy analysis methods. However, proper policy analysis and design is essential in managing the transition. This thesis takes an interdisciplinary approa ...
EPFL2019

Presentation attack detection in voice biometrics

Sébastien Marcel

Recent years have shown an increase in both the accuracy of biometric systems and their practical use. The application of biometrics is becoming widespread with fingerprint sensors in smartphones, automatic face recognition in social networks and video-bas ...
The Institution of Engineering and Technology2017

Side-Channel Attacks on Threshold Implementations using a Glitch Algebra

Serge Vaudenay

Threshold implementations allow to implement circuits us- ing secret sharing in a way to thwart side-channel attacks based on prob- ing or power analysis. It was proven they resist to attacks based on glitches as well. In this report, we show the limitatio ...
Springer Int Publishing Ag2016

On Modeling Terrorist Frauds

Serge Vaudenay

Quite recently, distance-bounding protocols received a lot of attention as they offer a good solution to thwart relay attacks. Their security models at still unstable, especially when considering terrorist fraud. This considers the case where a malicious p ...
Springer2013

On the Performance of Secure Vehicular Communication Systems

Jean-Pierre Hubaux, Panagiotis Papadimitratos

Vehicular communication (VC) systems are being developed primarily to enhance transportation safety and efficiency. Vehicle-to-vehicle communication, in particular, frequent cooperative awareness messages or safety beacons, has been considered over the pas ...
2011

Characterization of the secrecy region of a single relay cooperative system

Ninoslav Marina

Security is an important aspect for the future wire- less networks. Since the number of network nodes increases con- stantly, and, in addition, the networks are decentralized and ad- hoc in nature, it becomes more challenging to apply the current cryptogra ...
2010

Graph Chatbot

Chat with Graph Search

Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.

DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.