Privacy-preserving Authentication: Tokens and Credentials
Graph Chatbot
Chat with Graph Search
Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
Covers the principles and strategies of privacy engineering, emphasizing the importance of embedding privacy into IT systems and the challenges faced in achieving privacy by design.
Introduces Attribute-Based Credentials and Mercurial Signatures, discussing privacy concerns with authentication and the importance of preserving user privacy.
Examines anonymous communications using Tor to protect privacy and navigate internet censorship, discussing its history, functionality, and limitations.
Explores challenges in deep learning and machine learning applications, covering surveillance, privacy, manipulation, fairness, interpretability, energy efficiency, cost, and generalization.
Explores the challenges of protecting location privacy and various techniques to mitigate location-related inferences, highlighting the importance of trust assumptions and practical issues.