Efficient Protocols for Set Membership and Range Proofs
Publications associées (58)
Graph Chatbot
Chattez avec Graph Search
Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.
AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.
This paper presents an SVM-based algorithm for the transfer of knowledge across robot platforms aiming to perform the same task. Our method exploits efficiently the transferred knowledge while updating incrementally the internal representation as new infor ...
Facial expressions are probably the most visual method to convey emotions and one of the most powerful means to relate to each other. A typical automatic system for the recognition of facial expressions is based on a representation of the expression, learn ...
This test report describes the experimental program that was conducted within the scope of the research project on “Structural behaviour of elements combining Ultra-High Performance Fibre Reinforced Concretes (UHPFRC) and reinforced concrete” [Habel04]. Th ...
Passports are now equipped with RFID chips that contain private information, biometric data, and a digital signature by issuing authorities. We review most of applicable security and privacy issues. We argue that the main privacy issue is not unauthorized ...
This paper presents an SVM--based algorithm for the transfer of knowledge across robot platforms aiming to perform the same task. Our method exploits efficiently the transferred knowledge while updating incrementally the internal representation as new inf ...
With an ever-increasing understanding of the brain mechanisms associated with core human attributes and values, there is an increasing public interest in the results of neuroscience research and the ways in which that new knowledge will be used. Here, we p ...
Since the development of cryptology in the industrial and academic worlds in the seventies, public knowledge and expertise have grown in a tremendous way, notably because of the increasing, nowadays almost ubiquitous, presence of electronic communication m ...
The development of plastic card printers has led to the widespread use of identity documents printed on plastic cards, such as ID cards, driving licenses, and access key cards. This paper presents a new security feature based on a technique for embedding a ...
This article is about a breadth-first exploration of logical concepts in cryptography and their linguistic abstraction and model-theoretic combination in a comprehensive logical system, called CPL (for Cryptographic Protocol Logic). We focus on two fundame ...
We present a turnover based adaptive HELLO protocol (TAP), which enables nodes in mobile networks to dynamically adjust their HELLO messages frequency depending on the current speed of nodes. To the best of our knowledge, all existing solutions are based o ...