SafetyPin: Encrypted Backups with Human-Memorable Secrets
Graph Chatbot
Chattez avec Graph Search
Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.
AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.
User interaction with online geospatial systems is an inter-disciplinary research field that combines the two disciplines Human Computer Interaction (HCI) and geographic information sciences. In recent years online geospatial systems have been created for ...
Computers have become affordable, small, omnipresent and are often connected to the Internet. However, despite the availability of such rich environments, user interfaces have not been adapted to fully leverage their potential. In our view, user interfaces ...
In this paper, we review half a century of research on the design of systems displaying (physical) self-assembly of macroscopic components. We report on the experience gained in the design of 21 such systems, exhibiting components ranging from passive mech ...
Since the beginning of this brand new century, and especially since the 2001 Sept 11 events in the U.S, several biometric technologies are considered mature enough to be a new tool for security. Generally associated to a personal device for privacy protect ...
Multimodal dialogue systems integrate advanced (often spoken) language technologies within human-computer interaction methods. Such complex systems cannot be designed without extensive human expertise and systematic design guidelines taking into account th ...
In this paper, we review half a century of research on the design of systems displaying (physical) self-assembly of macroscopic components. We report on the experience gained in the design of 22 such systems, exhibiting components ranging from passive mech ...
Cryptographic protocols are an essential component of network communications. Despite their relatively small size compared to other distributed algorithms, they are known to be error-prone. This is due to the obligation to behave robustly in the context of ...
We consider example-critiquing systems that help people search for their most preferred item in a large electronic catalog. We analyze how such systems can help users in the framework of four existing example-critiquing approaches (RABBIT, FindMe, Incremen ...
Compound critiques allow users to simultaneously express directional preferences over several product attributes. Presenting the user with compound critiques is not a new idea. The original Find-Me Systems (e.g., Car Navigator) showed static compound criti ...
Association for Computing Machinery, New York, NY 10036-5701, United States2007
The deployment of vehicular communication (VC) systems is strongly dependent on their security and privacy features. In this paper, we propose a security architecture for VC. The primary objectives of the architecture include the management of identities a ...