Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
We propose a straightforward technique to provide peer-to-peer security in mobile networks. We show that far from being a hurdle, mobility can be exploited to set up security associations among users. We leverage on the temporary vicinity of users, during ...
Despite many good (secure) key agreement protocols based on public-key cryptography exist, secure associations between two wireless devices are often established using symmetric-key cryptography for cost reasons. The consequence is that common daily used s ...
This paper reports on results from a field experiment using a pervasive game that aims at eliciting the influence of location-awareness of others in a mobile and collaborative task. We present the environment as well as first results concerning how differe ...
Since the development of cryptology in the industrial and academic worlds in the seventies, public knowledge and expertise have grown in a tremendous way, notably because of the increasing, nowadays almost ubiquitous, presence of electronic communication m ...
There is an ever growing number of mobile learning applications based on location-awareness, However, there is still a lack of information concerning how it might impact socio-cognitive processes involved in collaboration. This is what the following empiri ...
This paper provides an asymptotic performance evaluation of network-based or multilateral positioning systems, where the times and/or angles of arrival of the signals traveling from a mobile station (MS) to a set of fixed stations (FSs) are used to estimat ...
Institute of Electrical and Electronics Engineers2004
Securing access to data in location- based services and mobile applications requires the definition of spatially aware access- control systems. Even if some approaches have already been proposed either in the context of geographic database systems or conte ...
The purpose of this demonstration is to illustrate that an off-the-shelf Wireless Sensor and Actuator Network (WSAN) can be used to discover resource availability and guide mobile users to these resources without any support from a navigation system like G ...
This thesis is primarily concerned with two security mechanisms for wireless networks: location verification and key management. These mechanisms are potential building blocks in the security architectures of a range of applications. Under location verific ...
We present a simple, and yet powerful, technique for key establishment over a radio link in peer-to-peer networks. Our approach is based on the Diffie-Hellman key agreement protocol. This protocol is known to be vulnerable to the ``man-in-the-middle" attac ...