Efficient Deniable Authentication for Signatures, Application to Machine-Readable Travel Document
Graph Chatbot
Chattez avec Graph Search
Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.
AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.
We consider a data owner that outsources its dataset to an untrusted server. The owner wishes to enable the server to answer range queries on a single attribute, without compromising the privacy of the data and the queries. There are several schemes on "pr ...
We consider a data owner that outsources its dataset to an untrusted server. The owner wishes to enable the server to answer range queries on a single attribute, without compromising the privacy of the data and the queries. There are several schemes on “pr ...
We introduce a novel data randomisation for the free wave equation which leads to the same range of Strichartz estimates as for radial data, albeit in a non-radial context. We then use these estimates to establish global wellposedness for a wave maps type ...
We disprove a conjecture in Density Functional Theory, relative to multimarginal optimal transport maps with Coulomb cost. In the case of spherically symmetric data, which model for instance Lithium and Beryllium atoms, we show that some special maps, intr ...
Machine Readable travel documents have been rapidly put in place since 2004. The initial standard was made by the ICAO and it has been quickly followed by the Extended Access Control (EAC). In this presentation, we discuss about the evolution of these stan ...
Scale and resolution have long been key issues of geography. In recent years, the rapid development of desktop or Internet Geographic Information Systems (GIS) has forced a more precise consideration of these concepts. This research focuses on fitting the ...
present several optimizations to SPHINCS, a stateless hash-based signature scheme proposed by Bernstein et al. in (2015): PORS, a more secure variant of the HORS few-time signature scheme used in SPHINCS; secret key caching, to speed-up signing and reduce ...
The detection of cytosolic DNA by the sensor cGAS triggers potent antiviral responses. New data now propose that cGAS is regulated on a post-translational level by glutamylation. ...
Endogeneity is an important issue that often arises in discrete choice models leading to biased estimates of the parameters. We propose the extended multiple indicator solution (EMIS) methodology to correct for it and exemplify it with a case study using r ...
Users often wish to participate in online groups anonymously, but misbehaving users may abuse this anonymity to disrupt the group. Messaging protocols such as Mix-nets and DC-nets leave online groups vulnerable to denial-of-service and Sybil attacks, while ...