Distance-bounding protocols allow a verifier to both authenticate a prover and evaluate whether the latter is located in his vicinity. These protocols are of particular interest in contactless systems, e.g. electronic payment or access control systems, whi ...
Particles and capsules are used as containers for active ingredients to delay their degradation and control the location and kinetics of their release. Key to a successful application of these containers is a good control over their size, composition, and ...
A significant number of pictures are posted to social media sites or exchanged through instant messaging and cloud-based sharing services. Most social media services offer a range of access control mechanisms to protect users privacy. As it is not in the b ...
The communication between an honest prover and an honest verifier can be intercepted by a malicious man-in-the-middle (MiM), without the legitimate interlocutors noticing the intrusion. The attacker can simply relay messages from one party to another, even ...
A multidisciplinary and shared computerized
patient record (CPR) has been progressively
implemented since 2002 for all public hospitals
in the State of Valais, Switzerland. This paper
presents the results of a formal evaluation of
user’s satisfaction ...
This PhD thesis focuses on fair exchange protocols and radio frequency identification protocols. Fair exchange stems from a daily life problem: how can two people exchange objects (material or immaterial) fairly, that is, without anyone being hurt in the e ...