Efficient Protocols for Set Membership and Range Proofs
Graph Chatbot
Chat with Graph Search
Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
This article is about a breadth-first exploration of logical concepts in cryptography and their linguistic abstraction and model-theoretic combination in a comprehensive logical system, called CPL (for Cryptographic Protocol Logic). We focus on two fundame ...
Facial expressions are probably the most visual method to convey emotions and one of the most powerful means to relate to each other. A typical automatic system for the recognition of facial expressions is based on a representation of the expression, learn ...
This paper presents an SVM--based algorithm for the transfer of knowledge across robot platforms aiming to perform the same task. Our method exploits efficiently the transferred knowledge while updating incrementally the internal representation as new inf ...
The development of plastic card printers has led to the widespread use of identity documents printed on plastic cards, such as ID cards, driving licenses, and access key cards. This paper presents a new security feature based on a technique for embedding a ...
We present a turnover based adaptive HELLO protocol (TAP), which enables nodes in mobile networks to dynamically adjust their HELLO messages frequency depending on the current speed of nodes. To the best of our knowledge, all existing solutions are based o ...
Since the development of cryptology in the industrial and academic worlds in the seventies, public knowledge and expertise have grown in a tremendous way, notably because of the increasing, nowadays almost ubiquitous, presence of electronic communication m ...
With an ever-increasing understanding of the brain mechanisms associated with core human attributes and values, there is an increasing public interest in the results of neuroscience research and the ways in which that new knowledge will be used. Here, we p ...
This test report describes the experimental program that was conducted within the scope of the research project on “Structural behaviour of elements combining Ultra-High Performance Fibre Reinforced Concretes (UHPFRC) and reinforced concrete” [Habel04]. Th ...
This paper presents an SVM-based algorithm for the transfer of knowledge across robot platforms aiming to perform the same task. Our method exploits efficiently the transferred knowledge while updating incrementally the internal representation as new infor ...
Passports are now equipped with RFID chips that contain private information, biometric data, and a digital signature by issuing authorities. We review most of applicable security and privacy issues. We argue that the main privacy issue is not unauthorized ...