The positivistic views that dominated the early debate on the foundations of mathematics, at the beginning of the 20th century, survived the “negative results” that have shown the limits of the axiomatic approach since the 1930s. Rigour, abstraction …
Presque 40 ans après, imaginons ce que serait le carrefour Mabillon sous la plume de Perec : “19 mai 2020. 3, 4, non 5 SUV défilent, les conducteurs aux visages masqués, au passage 3 piétons attendent le feu, chacun à distance. A chaque arrêt, la …
Living with a disability involves handling many costs that the general population is not aware of, which have recently been denounced in the online #CripTax campaign. Those costs can be split into many categories, the principal ones being financial …
This article explores the relationships that disabled people have with the space surrounding them. Extending Jacques Lévy’s work on various non-Euclidean spatialities, we study the discontinuous and discrete nature of space as inhabited by disabled …
People struggle to invent safe passwords for many of their typical online activities, leading to a variety of security problems when they use overly simple passwords or reuse them multiple times with minor modifications. Having different passwords for …
À l'occasion des centaines de milliers de décès soudains du Covid-19, la réalité tangible de la mort s'impose à nouveau à toute la société, après des siècles de mise à distance, jusque dans nos quotidiens confinés1. Alors que nous vivons de mémoire …
La pandémie du CoViD-19, vue comme expérience collective, a eu un effet de conver- gence des vécus minoritaires avec ceux de la « norme sociale ». L’exemple le plus évident est le confinement, qui a soudainement placé les personnes valides dans la même …
As passwords remain the main online authentication method, focus has shifted from naive entropy to how usability improvements can increase security. Chatterjee et al. recently introduced the first two typo-tolerant password checkers, their second …
Over the past four decades, fear of election manipulation and hacking has spurred the security technology community to propose a variety of voting systems to implement verifiable voting. Most of these rely on hard to understand cryptographic …
Reliance on technology has diminished our use of mental computation. However, mental computation's inherent privacy features are becoming central to new research on creating more secure and usable passwords than one gets with approaches such as …