Home - Topics - Papers - Talks - Theses - Blog - CV - Photos - Funny |
Identity Management through Privacy-Preserving Authentication – Ewa Syta | Aug 11 2015 |
Private Eyes: Secure Remote Biometric Authentication | Jul 20 2015 |
Strong Theft-Proof Privacy-Preserving Biometric Authentication | May 25 2012 |
Non-Linear Compression: Gzip Me Not! | Jun 14 2012 |
A Dynamic Recursive Unified Internet Design (DRUID) | Dec 24 2010 |
VXA: A Virtual Architecture for Durable Compressed Archives | Dec 16 2005 |
Die Datenpresse | Aug 1 1992 |
Towards General-Purpose Decentralized Computing with Permissionless Extensibility – Enis Ceyhun ALP | Jan 19 2024 |
Deterministically Deterring Timing Attacks in Deterland | Oct 4 2015 |
Warding off Timing Channels in Deterland – Weiyi Wu | Aug 10 2015 |
Lazy Tree Mapping: Generalizing and Scaling Deterministic Parallelism | Jul 29 2013 |
Deterministic OpenMP – Amittai F. Aviram | Sep 20 2012 |
Plugging Side-Channel Leaks with Timing Information Flow Control | Jun 13 2012 |
A Virtual Memory Foundation for Scalable Deterministic Parallelism | Jul 11 2011 |
Deterministic OpenMP for Race-Free Parallelism | May 26 2011 |
Workspace Consistency: A Programming Model for Shared Memory Parallelism | Mar 6 2011 |
Determinating Timing Channels in Compute Clouds | Oct 8 2010 |
Efficient System-Enforced Deterministic Parallelism | Oct 5 2010 |
Analyzing and Protecting Communication Metadata – Ludovic Barman | Sep 17 2021 |
PriFi: Low-Latency Anonymity for Organizational Networks | Jul 13 2020 |
Seeking Anonymity in an Internet Panopticon | Oct 1 2015 |
Security Analysis of Accountable Anonymity in Dissent | Aug 1 2014 |
Hang With Your Buddies to Resist Intersection Attacks | Nov 4 2013 |
Proactively Accountable Anonymous Messaging in Verdict | Aug 14 2013 |
Dissent in Numbers: Making Strong Anonymity Scale | Oct 8 2012 |
Scalable Anonymous Group Communication in the Anytrust Model | Apr 10 2012 |
Dissent: Accountable Anonymous Group Messaging | Oct 4 2010 |
CertiKOS: A Certified Kernel for Secure Cloud Computing | Jul 11 2011 |
Advanced Development of Certified OS Kernels | Jul 15 2010 |
Flick: A Flexible, Optimizing IDL Compiler | Jun 15 1997 |
Using Annotated Interface Definitions to Optimize RPC | Mar 1 1995 |
Separating Presentation from Interface in RPC and IDLs | Dec 1 1994 |
Voting and Blockchain: Promise and Challenges | Jan 20 2020 |
Beyond the ratchet: practical challenges in secure messaging – Simone Colombo | Jan 10 2025 |
Toward Internet Performance Transparency – Georgia Fragkouli | Aug 29 2022 |
Integrity and Metadata Protection in Data Retrieval – Kirill Nikitin | Nov 26 2021 |
Analyzing and Protecting Communication Metadata – Ludovic Barman | Sep 17 2021 |
Reducing Metadata Leakage from Encrypted Files and Communication with PURBs | Jul 18 2019 |
Metadata Protection Considerations for TLS Present and Future | Feb 21 2016 |
Deterministically Deterring Timing Attacks in Deterland | Oct 4 2015 |
Warding off Timing Channels in Deterland – Weiyi Wu | Aug 10 2015 |
Lazy Tree Mapping: Generalizing and Scaling Deterministic Parallelism | Jul 29 2013 |
Deterministic OpenMP – Amittai F. Aviram | Sep 20 2012 |
A Virtual Memory Foundation for Scalable Deterministic Parallelism | Jul 11 2011 |
Deterministic OpenMP for Race-Free Parallelism | May 26 2011 |
Workspace Consistency: A Programming Model for Shared Memory Parallelism | Mar 6 2011 |
Determinating Timing Channels in Compute Clouds | Oct 8 2010 |
Efficient System-Enforced Deterministic Parallelism | Oct 5 2010 |
Robust and High-Performance Wide-Area Consensus Protocols – Pasindu Tennage | Aug 15 2025 |
Consensus for Decentralized Ledgers | Oct 25 2021 |
Distributed Randomness | Jul 30 2020 |
Secure, Confidential Blockchains Providing High Throughput and Low Latency – Eleftherios Kokoris Kogias | Sep 27 2019 |
OmniLedger: A Secure, Scale-Out, Decentralized Ledger via Sharding | May 22 2018 |
Scalable Bias-Resistant Distributed Randomness | May 23 2017 |
Ensuring High-Quality Randomness in Cryptographic Key Generation | Nov 4 2013 |
Privacy-Preserving Federated Analytics using Multiparty Homomorphic Encryption – David Jules Froelicher | Oct 1 2021 |
International Scientific Conferences Must Leave the U.S. | Jun 27 2018 |
Faculty size and growth in the top 20 Computer Science departments | Oct 22 2014 |
Interface and Execution Models in the Fluke Kernel | Feb 24 1999 |
CPU Inheritance Scheduling | Oct 30 1996 |
Evolving Mach 3.0 to A Migrating Thread Model | Jan 17 1994 |
Notes on Thread Models in Mach 3.0 | Apr 1 1993 |
Integrity and Metadata Protection in Data Retrieval – Kirill Nikitin | Nov 26 2021 |
Analyzing and Protecting Communication Metadata – Ludovic Barman | Sep 17 2021 |
Deterministically Deterring Timing Attacks in Deterland | Oct 4 2015 |
Warding off Timing Channels in Deterland – Weiyi Wu | Aug 10 2015 |
Plugging Side-Channel Leaks with Timing Information Flow Control | Jun 13 2012 |
Determinating Timing Channels in Compute Clouds | Oct 8 2010 |
ZeroAuction: Zero-Deposit Sealed-bid Auction via Delayed Execution | Mar 8 2024 |
Towards General-Purpose Decentralized Computing with Permissionless Extensibility – Enis Ceyhun ALP | Jan 19 2024 |
Flash Freezing Flash Boys: Countering Blockchain Front-Running | Jul 10 2022 |
Rethinking General-Purpose Decentralized Computing | May 12 2019 |
Maple: Simplifying SDN Programming Using Algorithmic Policies | Aug 13 2013 |
Scaling Software-Defined Network Controllers on Multicore Servers | Jul 1 2012 |
Building Strongly-Consistent Systems Resilient to Failures, Partitions, and Slowdowns – Cristina Băsescu | May 26 2023 |
GPUfs: The Case for Operating System Services on GPUs | Dec 1 2014 |
GPUfs: Integrating a File System with GPUs | Mar 20 2013 |
Device Transparency: a New Model for Mobile Storage | Oct 11 2009 |
VXA: A Virtual Architecture for Durable Compressed Archives | Dec 16 2005 |
Cache Directory Tagging Specification | Jul 19 2004 |
Service Duality - Vitalizing the Commons | Jul 24 2003 |
Beyond the ratchet: practical challenges in secure messaging – Simone Colombo | Jan 10 2025 |
AI for Governance Belongs in Mechanism, Not Policy | Nov 18 2020 |
Design choices for Central Bank Digital Currency | Jul 23 2020 |
On Enforcing the Digital Immunity of a Large Humanitarian Organization | May 22 2018 |
Technology Governs Us. Will it Govern Us Well? | Jun 23 2017 |
Multiple Objectives of Lawful-Surveillance Protocols | Mar 20 2017 |
Privacy-Preserving Lawful Contact Chaining | Oct 24 2016 |
Open, privacy-preserving protocols for lawful surveillance | Jul 13 2016 |
Open Surveillance | Oct 21 2014 |
Catching Bandits and Only Bandits: Privacy-Preserving Intersection Warrants for Lawful Surveillance | Aug 18 2014 |
Sightseeing Around Lausanne | Jun 16 2018 |
Bryan Ford |