A Use Case Oriented Survey of Self-Sovereign Identity
Graph Chatbot
Chattez avec Graph Search
Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.
AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.
Research on founder identity has significantly advanced our understanding of entrepreneurship and related literatures. By departing from the widely held-though often implicit-assumption that culture defines the parameters of identity formation, this paper ...
In a society that recognizes the urgency of safeguarding the environment and drastically limiting land transformations and energy-intensive activities like constructing new buildings, the protection of architectural and environmental heritage is no longer ...
2024
,
Background: Many addictive behaviours are influenced by the context in which they occur, but methods for simultaneously capturing the characteristics of a behaviour and its context are scarce. This study describes a smartphone application developed to docu ...
We design a consecution of protocols which allows organizations to have secure strong access control of their users to their desktop machines based on biometry. It provides both strong secure authentication and privacy. Moreover, our mechanism allows the s ...
We design a suite of protocols so that a small tamper-resistant device can be used as a biometric identity document which can be scanned by authorized terminals. We target both strongly secure identification and strong privacy. Unlike biometric passports, ...
Springer2019
, ,
We design a suite of protocols so that a small tamperresistant device can be used as a biometric identity document which can be scanned by authorized terminals. We target both strongly secure identification and strong privacy. Unlike biometric passports, o ...
SPRINGER INTERNATIONAL PUBLISHING AG2019
We prove an identity relating the permanent of a rank 2 matrix and the determinants of its Hadamard powers. When viewed in the right way, the resulting formula looks strikingly similar to an identity of Carlitz and Levine, suggesting the possibility that t ...
Digital identity seems at first like a prerequisite for digital democracy: how can we ensure “one person, one vote” online without identifying voters? But the full gamut of digital identity solutions – e.g., online ID checking, biometrics, self-sovereign i ...
Digital Twins (DT) are proposed in industries to support the entire lifecycle of services with different perspectives. Lack of systematic analysis of DT concepts leads to various definitions and services which challenges the DT developers for data integrat ...
SPRINGER INTERNATIONAL PUBLISHING AG2020
,
This article explores how readers recognize their personal identities represented through data visualizations. The recognition is investigated starting from three definitions captured by the philosopher Paul Ricoeur: the identification with the visualizati ...