Events

Dec 6, 2018
C4DT workshops

Security and Privacy of Wearable Devices

A growing number of wearable devices are becoming available. By their ability to measure physical activity and physiological characteristics such as heart rate, blood pressure, sleep patterns, etc., they constitute a cornerstone for the quantified self and personalized health. Yet, unavoidably, they bring a number of challenges in terms of security and privacy. 10:15-13:00 – […]

View
Nov 29, 2018
C4DT seminars

Learning from the People

presented by Elissa Redmiles From Normative to Descriptive Solutions to Problems in Security, Privacy & Machine Learning 16h15 Р29 November 2018 EPFL BC420

View
Nov 14, 2018
C4DT seminars

PURBs

presented by Ludovic Barman Reducing Metadata Leakage from Encrypted Files and Communication with PURBs 16h15 – 14 November 2018 EPFL BC410

View
Nov 2, 2018
C4DT seminars

BurnBox

presented by Enis Ceyhun Alp RBurnBox: Self-Revocable Encryption in a World of Compelled Access 11h15 – 2 November 2018, EPFL BC410 Recent work by Nirvan Tyagi, Muhammad Haris Mughees, Thomas Ristenpart, and Ian Miers, which was presented at Usenix Security 2018. More info

View
Oct 17, 2018
C4DT seminars

Drynx

presented by David Froelicher Drynx: A Decentralized, Secure, Verifiable System for Statistical Queries and Machine Learning on Distributed Databases 16h15 – 17 October 2018, EPFL BC410

View
Oct 3, 2018
C4DT seminars

ClaimChain

presented by Bogdan Kulynych ClaimChain: Improving the Security and Privacy of In-band Key Distribution for Messaging 16h15 – 3 October 2018, EPFL BC410 Dry-run for the 2018 Workshop on Privacy in the Electronic Society (WPES’18). More info

View
Feb 26 - Mar 2, 2018
C4DT courses

C4DT’s Academy teaches “digital trust” skills to ICRC lawyers

A group of lawyers and policy workers from the International Red Cross (ICRC) and other organizations concluded a computing and digital trust awareness-raising training at EPFL.The week-long course in collaboration with C4DT is intended to equip them with the tools to evaluate the impact of information systems on their humanitarian activities. The course starts from computing basics and touches cloud computing, information security and privacy preservation.

View

« More recent events