Publications associées (12)

A RISC-V Extension to Minimize Privileges of Enclave Runtimes

Edouard Bugnion, Neelu Shivprakash Kalani

In confidential computing, the view of the system software is Manichean: the host operating system is untrusted and the TEE runtime system is fully trusted. However, the runtime system is often as complex as a full operating system, and thus is not free fr ...
ACM2023

On Secure Cloud Computing for Genomic Data: From Storage to Analysis

Zhicong Huang

Although privacy is generally considered to be the right of an individual or group to control information about themselves, such a right has become challenging to protect in the digital era, this is exemplified by the case of cloud-based genomic computing. ...
EPFL2018

Implications of Position in Cryptography

Handan Kilinç Alper

In our daily lives, people or devices frequently need to learn their location for many reasons as some services depend on the absolute location or the proximity. The outcomes of positioning systems can have critical effects e.g., on military, emergency. Th ...
EPFL2018

Personal Learning with Social Media

Na Li

Social media platforms are increasingly used in recent years to support learning activities, especially for the construction of activity- and learner-centric personal learning environments (PLEs). This thesis investigates the solutions to four essential de ...
EPFL2015

PANACEA: Tunable Privacy for Access Controlled Data in Peer-to-Peer Systems

Karl Aberer

Peer-to-peer paradigm is increasingly employed for organizing distributed resources for various applications, e.g. content distribution, open storage grid etc. In open environments, even when proper access control mechanisms supervise the access to the res ...
EPFL Infoscience2010

Tunable Privacy for Access Controlled Data in Peer-to-Peer Systems

Karl Aberer, Zoltán Miklós

Peer-to-peer paradigm is increasingly employed for organizing distributed resources for various applications, e.g. content distribution, open storage grid etc. In open environments, even when proper access control mechanisms supervise the access to the res ...
2010

Conception of a Piezoelectric Micromotor

Ultrasonic Motors are drive systems used in a lot of industrial applications notably because of their advantages i.e. no audible noise, compact size and fast response. Therefore, this technology has been chosen for the design of a new type of actuator for ...
2008

Graph Chatbot

Chattez avec Graph Search

Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.

AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.