Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.
AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.
Distance-Bounding is used to defeat relay attacks. For wireless payment systems, the payment terminal is not always online. So, the protocol must rely on a public key for the prover (payer). We propose a generic transformation of a (weakly secure) symmetri ...
In a context of housing crisis and general increase in short-term/casual work, new forms of social precarity have developed since the end of the nineties in Western countries. Furthermore, a movement of voluntary shift to nomadic lifestyles is initiated. P ...
This investigation focuses on people like Gaby, Martin, Émilie and Jean, men and women whose lives are shaped by their transport experience. Their day to day is made real in this graphic novel, revealing to the reader the many forms and perceptions of work ...
Commuting and travelling extensively for job reasons both helps and challenges people to balance competing demands of work and personal life. People do not have equal resources and possibilities to benefit from high mobility. Globalisation, labour flexibil ...
Public-key distance bounding schemes are needed to defeat relay attacks in payment systems. So far, only five such schemes exist, but fail to fully protect against malicious provers. In this paper, we solve this problem. We provide a full formalism to defi ...
In this work we study periocular biometrics in a challenging scenario: a mobile environment, where person recognition can take place on a mobile device. The proposed technique, that models session variability, is evaluated for the authentication task on th ...
Today a wide range of technologies exist that support learning and teaching, ranging from learning management systems (LMS) to general social media platforms, such as Facebook and blogs. However, teaching with such tools and platforms can create various ob ...
This paper takes a frank look at what has and has not been achieved in African language technology during the past two decades. Several questions are addressed: What was the status of technology for African languages 20 years ago? What were the major initi ...
Remote and virtual laboratories aim to overcome typical constraints of traditional laboratories and offer access to laboratory experiments without location and time restrictions. Additionally, the continuous growth of mobile devices’ ownership, as well as ...
Smartcard-based protocols represent an increasingly large share of the wireless authentication market, from contactless payments to remote car unlocking. Unfortunately, relay attacks pose a significant threat to these wireless solutions. However, this risk ...