Bridging the gap between theoretical and practical privacy technologies for at-risk populations
Graph Chatbot
Chat with Graph Search
Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
We present a scheme for secure and privacy-preserving communication in hybrid ad hoc networks. Our scheme enables users to secure communication and to protect their anonymity and location privacy. Our approach is based on frequently changing node pseudonym ...
Vehicular Networks (VNs) seek to provide, among other applications, safer driving conditions. To do so, vehicles need to periodically broadcast safety messages providing precise position information to nearby vehicles. However, this frequent messaging (e.g ...
RFID systems makes it possible for a server to identify known tags in wireless settings. As they become more and more pervasive, people privacy is more and more threatened. In this talk, we list a few models for privacy in RFID and compare them. We review ...
On the basis of the archives of the International Committee of the Red Cross, Isabelle Vonèche Cardia analyses the action taken by the humanitarian organization during the events in Hungary in 1956 and subsequently into the 1960s. The author brings out a l ...
In this paper we present a novel approach to location obfuscation for location privacy purposes. The motivating observation is that obfuscation strategies only grounded on geometric criteria can lead to privacy leaks. We thus propose to complement geometry ...