Home - Topics - Papers - Theses - Blog - CV - Photos - Funny

Writings by Topic – Bryan Ford

Authenticated Private Information Retrieval

Aug 10 2023

Toward Internet Performance Transparency – Georgia Fragkouli

Aug 29 2022

Auditing the Swiss Post E-voting System: An Architectural Perspective

Apr 4 2022

3PBCS: A Privacy-Preserving, Personhood-Based Credential System – Ksandros Apostoli

Mar 22 2022

Moby: A Blackout-Resistant Anonymity Network for Mobile Devices

Mar 16 2022

TRIP: Trustless Coercion-Resistant In-Person Voter Registration

Feb 14 2022

Integrity and Metadata Protection in Data Retrieval – Kirill Nikitin

Nov 26 2021

Analyzing and Protecting Communication Metadata – Ludovic Barman

Sep 17 2021

PriFi: Low-Latency Anonymity for Organizational Networks

Jul 13 2020

MorphIT: Morphing Packet Reports for Internet Transparency

May 4 2019

Atom: Horizontally Scaling Strong Anonymity

Oct 30 2017

Proof-of-Personhood: Redemocratizing Permissionless Cryptocurrencies

Apr 29 2017

Privacy-Preserving Lawful Contact Chaining

Oct 24 2016

Riffle: An Efficient Communication System With Strong Anonymity

Jul 19 2016

AnonRep: Towards Tracking-Resistant Anonymous Reputation

Mar 16 2016

Building Privacy-Preserving Cryptographic Credentials from Federated Online Identities

Mar 16 2016

Let's verify real people, not real names.

Oct 7 2015

Seeking Anonymity in an Internet Panopticon

Oct 1 2015

Identity Management through Privacy-Preserving Authentication – Ewa Syta

Aug 11 2015

Building Privacy-Preserving Cryptographic Credentials from Federated Online Identities – John Maheswaran

Jun 24 2015

Catching Bandits and Only Bandits: Privacy-Preserving Intersection Warrants for Lawful Surveillance

Aug 18 2014

Managing NymBoxes for Identity and Tracking Protection

Aug 1 2014

Security Analysis of Accountable Anonymity in Dissent

Aug 1 2014

A TorPath to TorCoin: Proof-of-Bandwidth Altcoins for Compensating Relays

Jul 18 2014

From Onions to Shallots: Rewarding Tor Relays with TEARS

Jul 18 2014

Crypto-Book: An Architecture for Privacy Preserving Online Identities

Nov 22 2013

Conscript Your Friends into Larger Anonymity Sets with JavaScript

Nov 4 2013

Hang With Your Buddies to Resist Intersection Attacks

Nov 4 2013

Proactively Accountable Anonymous Messaging in Verdict

Aug 14 2013

Reducing Latency in Tor Circuits with Unordered Delivery

Aug 13 2013

Dissent in Numbers: Making Strong Anonymity Scale

Oct 8 2012

Scavenging for Anonymity with BlogDrop

Jul 9 2012

Faceless: Decentralized Anonymous Group Messaging for Online Social Networks

Apr 10 2012

Scalable Anonymous Group Communication in the Anytrust Model

Apr 10 2012

Dissent: Accountable Anonymous Group Messaging

Oct 4 2010

An Offline Foundation for Online Accountable Pseudonyms

Apr 1 2008

Sybil Parties: An Offline Foundation for Online Accountability

Sep 24 2006

ZeroAuction: Zero-Deposit Sealed-bid Auction via Delayed Execution

Mar 8 2024

Building Strongly-Consistent Systems Resilient to Failures, Partitions, and Slowdowns – Cristina Băsescu

May 26 2023

Flash Freezing Flash Boys: Countering Blockchain Front-Running

Jul 10 2022

Integrity and Metadata Protection in Data Retrieval – Kirill Nikitin

Nov 26 2021

CALYPSO: Private Data Management for Decentralized Ledgers

Aug 16 2021

Technologizing Democracy or Democratizing Technology? A Layered-Architecture Perspective on Potentials and Challenges

Feb 1 2021

Design choices for Central Bank Digital Currency

Jul 23 2020

Secure, Confidential Blockchains Providing High Throughput and Low Latency – Eleftherios Kokoris Kogias

Sep 27 2019

Rationality is Self-Defeating in Permissionless Systems

Sep 23 2019

On the Security of Two-Round Multi-Signatures

May 20 2019

Rethinking General-Purpose Decentralized Computing

May 12 2019

So They're Selling You a Blockchain

Sep 11 2018

Democratic Value and Money for Decentralized Digital Society

Jun 1 2018

OmniLedger: A Secure, Scale-Out, Decentralized Ledger via Sharding

May 22 2018

CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds

Aug 18 2017

How Do You Know It's On the Blockchain? With a SkipChain.

Aug 1 2017

Proof-of-Personhood: Redemocratizing Permissionless Cryptocurrencies

Apr 29 2017

Untangling Mining Incentives in Bitcoin and ByzCoin

Oct 25 2016

Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing

Aug 10 2016

Keeping Authorities “Honest or Bust” with Decentralized Witness Cosigning

May 23 2016

AnonRep: Towards Tracking-Resistant Anonymous Reputation

Mar 16 2016

Collectively Witnessing Log Servers in CT

Oct 20 2015

A TorPath to TorCoin: Proof-of-Bandwidth Altcoins for Compensating Relays

Jul 18 2014

E-Vote Your Conscience: Perceptions of Coercion and Vote Buying, and the Usability of Fake Credentials in Online Voting

May 20 2024

Authenticated Private Information Retrieval

Aug 10 2023

Flash Freezing Flash Boys: Countering Blockchain Front-Running

Jul 10 2022

Auditing the Swiss Post E-voting System: An Architectural Perspective

Apr 4 2022

3PBCS: A Privacy-Preserving, Personhood-Based Credential System – Ksandros Apostoli

Mar 22 2022

TRIP: Trustless Coercion-Resistant In-Person Voter Registration

Feb 14 2022

Integrity and Metadata Protection in Data Retrieval – Kirill Nikitin

Nov 26 2021

Privacy-Preserving Federated Analytics using Multiparty Homomorphic Encryption – David Jules Froelicher

Oct 1 2021

Analyzing and Protecting Communication Metadata – Ludovic Barman

Sep 17 2021

CALYPSO: Private Data Management for Decentralized Ledgers

Aug 16 2021

Design choices for Central Bank Digital Currency

Jul 23 2020

PriFi: Low-Latency Anonymity for Organizational Networks

Jul 13 2020

Secure, Confidential Blockchains Providing High Throughput and Low Latency – Eleftherios Kokoris Kogias

Sep 27 2019

Reducing Metadata Leakage from Encrypted Files and Communication with PURBs

Jul 18 2019

On the Security of Two-Round Multi-Signatures

May 20 2019

MedChain: Accountable and Auditable Data Sharing in Distributed Medical Scenarios

Mar 25 2019

MedCo: Enabling Secure and Privacy-Conscious Exploration of Distributed Clinical and Genomic Data

Jul 13 2018

CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds

Aug 18 2017

How Do You Know It's On the Blockchain? With a SkipChain.

Aug 1 2017

UnLynx: A Decentralized System for Privacy-Conscious Data Sharing

Jul 19 2017

Scalable Bias-Resistant Distributed Randomness

May 23 2017

Multiple Objectives of Lawful-Surveillance Protocols

Mar 20 2017

Privacy-Preserving Lawful Contact Chaining

Oct 24 2016

Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing

Aug 10 2016

Riffle: An Efficient Communication System With Strong Anonymity

Jul 19 2016

Open, privacy-preserving protocols for lawful surveillance

Jul 13 2016

Keeping Authorities “Honest or Bust” with Decentralized Witness Cosigning

May 23 2016

AnonRep: Towards Tracking-Resistant Anonymous Reputation

Mar 16 2016

Building Privacy-Preserving Cryptographic Credentials from Federated Online Identities

Mar 16 2016

Apple, FBI, and Software Transparency

Mar 10 2016

Collectively Witnessing Log Servers in CT

Oct 20 2015

Seeking Anonymity in an Internet Panopticon

Oct 1 2015

Identity Management through Privacy-Preserving Authentication – Ewa Syta

Aug 11 2015

Private Eyes: Secure Remote Biometric Authentication

Jul 20 2015

Certificate Cothority: Towards Trustworthy Collective CAs

Jul 2 2015

Building Privacy-Preserving Cryptographic Credentials from Federated Online Identities – John Maheswaran

Jun 24 2015

Open Surveillance

Oct 21 2014

Catching Bandits and Only Bandits: Privacy-Preserving Intersection Warrants for Lawful Surveillance

Aug 18 2014

Security Analysis of Accountable Anonymity in Dissent

Aug 1 2014

A TorPath to TorCoin: Proof-of-Bandwidth Altcoins for Compensating Relays

Jul 18 2014

From Onions to Shallots: Rewarding Tor Relays with TEARS

Jul 18 2014

Crypto-Book: An Architecture for Privacy Preserving Online Identities

Nov 22 2013

Conscript Your Friends into Larger Anonymity Sets with JavaScript

Nov 4 2013

Ensuring High-Quality Randomness in Cryptographic Key Generation

Nov 4 2013

Hang With Your Buddies to Resist Intersection Attacks

Nov 4 2013

Proactively Accountable Anonymous Messaging in Verdict

Aug 14 2013

Dissent in Numbers: Making Strong Anonymity Scale

Oct 8 2012

Scavenging for Anonymity with BlogDrop

Jul 9 2012

Strong Theft-Proof Privacy-Preserving Biometric Authentication

May 25 2012

Scalable Anonymous Group Communication in the Anytrust Model

Apr 10 2012

Eyo: Device-Transparent Personal Storage

Jun 15 2011

Dissent: Accountable Anonymous Group Messaging

Oct 4 2010

Efficient Cross-Layer Negotiation

Oct 22 2009

UIA: A Global Connectivity Architecture for Mobile Personal Devices

Sep 1 2008

Alpaca: Extensible Authorization for Distributed Services

Oct 29 2007

Structured Streams: a New Transport Abstraction

Aug 27 2007

Unmanaged Internet Protocol: Taming the Edge Network Management Crisis

Nov 20 2003

E-Vote Your Conscience: Perceptions of Coercion and Vote Buying, and the Usability of Fake Credentials in Online Voting

May 20 2024

Authenticated Private Information Retrieval

Aug 10 2023

3PBCS: A Privacy-Preserving, Personhood-Based Credential System – Ksandros Apostoli

Mar 22 2022

TRIP: Trustless Coercion-Resistant In-Person Voter Registration

Feb 14 2022

Technologizing Democracy or Democratizing Technology? A Layered-Architecture Perspective on Potentials and Challenges

Feb 1 2021

Identity and Personhood in Digital Democracy: Evaluating Inclusion, Equality, Security, and Privacy in Pseudonym Parties and Other Proofs of Personhood

Nov 4 2020

Design choices for Central Bank Digital Currency

Jul 23 2020

Rethinking Priorities: Should Identity Systems Divide or Unite People?

Feb 8 2019

A Liquid Perspective on Democratic Choice

Nov 1 2018

Democratic Value and Money for Decentralized Digital Society

Jun 1 2018

Proof-of-Personhood: Redemocratizing Permissionless Cryptocurrencies

Apr 29 2017

Keeping Authorities “Honest or Bust” with Decentralized Witness Cosigning

May 23 2016

AnonRep: Towards Tracking-Resistant Anonymous Reputation

Mar 16 2016

Building Privacy-Preserving Cryptographic Credentials from Federated Online Identities

Mar 16 2016

Collectively Witnessing Log Servers in CT

Oct 20 2015

Let's verify real people, not real names.

Oct 7 2015

Identity Management through Privacy-Preserving Authentication – Ewa Syta

Aug 11 2015

Private Eyes: Secure Remote Biometric Authentication

Jul 20 2015

Certificate Cothority: Towards Trustworthy Collective CAs

Jul 2 2015

Building Privacy-Preserving Cryptographic Credentials from Federated Online Identities – John Maheswaran

Jun 24 2015

Managing NymBoxes for Identity and Tracking Protection

Aug 1 2014

Crypto-Book: An Architecture for Privacy Preserving Online Identities

Nov 22 2013

Strong Theft-Proof Privacy-Preserving Biometric Authentication

May 25 2012

A Dynamic Recursive Unified Internet Design (DRUID)

Dec 24 2010

Efficient Cross-Layer Negotiation

Oct 22 2009

UIA: A Global Connectivity Architecture for Mobile Personal Devices

Sep 1 2008

An Offline Foundation for Online Accountable Pseudonyms

Apr 1 2008

Alpaca: Extensible Authorization for Distributed Services

Oct 29 2007

Persistent Personal Names for Globally Connected Mobile Devices

Nov 6 2006

Sybil Parties: An Offline Foundation for Online Accountability

Sep 24 2006

User-Relative Names for Globally Connected Personal Devices

Feb 27 2006

Unmanaged Internet Protocol: Taming the Edge Network Management Crisis

Nov 20 2003

Scalable Internet Routing on Topology-Independent Node Identities

Oct 31 2003

QuePaxa: Escaping the Tyranny of Timeouts in Consensus

Oct 23 2023

Building Strongly-Consistent Systems Resilient to Failures, Partitions, and Slowdowns – Cristina Băsescu

May 26 2023

Toward Internet Performance Transparency – Georgia Fragkouli

Aug 29 2022

Immunizing Systems from Distant Failures by Limiting Lamport Exposure

Nov 10 2021

Analyzing and Protecting Communication Metadata – Ludovic Barman

Sep 17 2021

PriFi: Low-Latency Anonymity for Organizational Networks

Jul 13 2020

Que Sera Consensus: Simple Asynchronous Agreement with Private Coins and Threshold Logical Clocks

Mar 4 2020

Threshold Logical Clocks for Asynchronous Distributed Coordination and Consensus

Jul 16 2019

MorphIT: Morphing Packet Reports for Internet Transparency

May 4 2019

Atom: Horizontally Scaling Strong Anonymity

Oct 30 2017

Metadata Protection Considerations for TLS Present and Future

Feb 21 2016

TAQ: Enhancing Fairness and Performance Predictability in Small Packet Regimes

Apr 14 2014

Maple: Simplifying SDN Programming Using Algorithmic Policies

Aug 13 2013

Reducing Latency in Tor Circuits with Unordered Delivery

Aug 13 2013

Non-Linear Compression: Gzip Me Not!

Jun 14 2012

Fitting Square Pegs Through Round Pipes: Unordered Delivery Wire-Compatible with TCP and TLS

Apr 27 2012

Eyo: Device-Transparent Personal Storage

Jun 15 2011

A Dynamic Recursive Unified Internet Design (DRUID)

Dec 24 2010

Minion: an all-terrain packet packhorse to jump-start stalled internet transports

Nov 28 2010

Dissent: Accountable Anonymous Group Messaging

Oct 4 2010

Unintended Consequences of NAT Deployments with Overlapping Address Space

Feb 1 2010

Efficient Cross-Layer Negotiation

Oct 22 2009

NAT Behavioral Requirements for ICMP

Apr 1 2009

Breaking Up the Transport Logjam

Oct 6 2008

NAT Behavioral Requirements for TCP

Oct 1 2008

UIA: A Global Connectivity Architecture for Mobile Personal Devices

Sep 1 2008

State of Peer-to-Peer (P2P) Communication across Network Address Translators (NATs)

Mar 1 2008

Directions in Internet Transport Evolution

Dec 1 2007

Alpaca: Extensible Authorization for Distributed Services

Oct 29 2007

Structured Streams: a New Transport Abstraction

Aug 27 2007

Persistent Personal Names for Globally Connected Mobile Devices

Nov 6 2006

User-Relative Names for Globally Connected Personal Devices

Feb 27 2006

Peer-to-Peer Communication Across Network Address Translators

Apr 10 2005

Application Design Guidelines for Traversal through Network Address Translators

Feb 1 2005

Operating Principles and General Behavioral Requirements for Network Address Translators (BEH-GEN)

Feb 1 2005

Unmanaged Internet Protocol: Taming the Edge Network Management Crisis

Nov 20 2003

Scalable Internet Routing on Topology-Independent Node Identities

Oct 31 2003

QuePaxa: Escaping the Tyranny of Timeouts in Consensus

Oct 23 2023

Auditing the Swiss Post E-voting System: An Architectural Perspective

Apr 4 2022

Rethinking General-Purpose Decentralized Computing

May 12 2019

Deterministically Deterring Timing Attacks in Deterland

Oct 4 2015

A Flexible Architecture for Structural Reliability Auditing to the Clouds – Ennan Zhai

Aug 11 2015

Warding off Timing Channels in Deterland – Weiyi Wu

Aug 10 2015

GPUfs: The Case for Operating System Services on GPUs

Dec 1 2014

Heading Off Correlated Failures through Independence-as-a-Service

Oct 7 2014

Managing NymBoxes for Identity and Tracking Protection

Aug 1 2014

Structural Cloud Audits that Protect Private Information

Nov 8 2013

An Untold Story of Redundant Clouds: Making Your Service Deployment Truly Reliable

Nov 3 2013

Lazy Tree Mapping: Generalizing and Scaling Deterministic Parallelism

Jul 29 2013

GPUfs: Integrating a File System with GPUs

Mar 20 2013

Enhancing the OS against Security Threats in System Administration

Dec 3 2012

Deterministic OpenMP – Amittai F. Aviram

Sep 20 2012

Scaling Software-Defined Network Controllers on Multicore Servers

Jul 1 2012

Non-Linear Compression: Gzip Me Not!

Jun 14 2012

Plugging Side-Channel Leaks with Timing Information Flow Control

Jun 13 2012

Icebergs in the Clouds: the Other Risks of Cloud Computing

Jun 12 2012

A Virtual Memory Foundation for Scalable Deterministic Parallelism

Jul 11 2011

CertiKOS: A Certified Kernel for Secure Cloud Computing

Jul 11 2011

Eyo: Device-Transparent Personal Storage

Jun 15 2011

Deterministic OpenMP for Race-Free Parallelism

May 26 2011

Workspace Consistency: A Programming Model for Shared Memory Parallelism

Mar 6 2011

Determinating Timing Channels in Compute Clouds

Oct 8 2010

Efficient System-Enforced Deterministic Parallelism

Oct 5 2010

Advanced Development of Certified OS Kernels

Jul 15 2010

Device Transparency: a New Model for Mobile Storage

Oct 11 2009

Vx32: Lightweight User-level Sandboxing on the x86

Jun 27 2008

Alpaca: Extensible Authorization for Distributed Services

Oct 29 2007

Persistent Personal Names for Globally Connected Mobile Devices

Nov 6 2006

VXA: A Virtual Architecture for Durable Compressed Archives

Dec 16 2005

Cache Directory Tagging Specification

Jul 19 2004

Fx86: Functional Management of Imperative Virtual Machines

Aug 28 2003

Interface and Execution Models in the Fluke Kernel

Feb 24 1999

The Flux OSKit: A Substrate for Kernel and Language Research

Oct 6 1997

Flick: A Flexible, Optimizing IDL Compiler

Jun 15 1997

The Flux OS Toolkit: Reusable Components for OS Implementation

May 5 1997

CPU Inheritance Scheduling

Oct 30 1996

Microkernels Meet Recursive Virtual Machines

Oct 30 1996

User-level Checkpointing Through Exportable Kernel State

Oct 27 1996

The Persistent Relevance of the Local Operating System to Global Applications

Sep 9 1996

Using Annotated Interface Definitions to Optimize RPC

Mar 1 1995

Separating Presentation from Interface in RPC and IDLs

Dec 1 1994

Evolving Mach 3.0 to A Migrating Thread Model

Jan 17 1994

Microkernels Should Support Passive Objects

Dec 9 1993

FLEX: A Tool for Building Efficient and Flexible Systems

Oct 14 1993

In-Kernel Servers on Mach 3.0: Implementation and Performance

Apr 19 1993

Notes on Thread Models in Mach 3.0

Apr 1 1993

Die Datenpresse

Aug 1 1992

Object-Oriented Display Refreshing

Apr 1 1992

E-Vote Your Conscience: Perceptions of Coercion and Vote Buying, and the Usability of Fake Credentials in Online Voting

May 20 2024

ZeroAuction: Zero-Deposit Sealed-bid Auction via Delayed Execution

Mar 8 2024

Authenticated Private Information Retrieval

Aug 10 2023

Toward Internet Performance Transparency – Georgia Fragkouli

Aug 29 2022

Auditing the Swiss Post E-voting System: An Architectural Perspective

Apr 4 2022

3PBCS: A Privacy-Preserving, Personhood-Based Credential System – Ksandros Apostoli

Mar 22 2022

Moby: A Blackout-Resistant Anonymity Network for Mobile Devices

Mar 16 2022

TRIP: Trustless Coercion-Resistant In-Person Voter Registration

Feb 14 2022

Integrity and Metadata Protection in Data Retrieval – Kirill Nikitin

Nov 26 2021

Privacy-Preserving Federated Analytics using Multiparty Homomorphic Encryption – David Jules Froelicher

Oct 1 2021

Analyzing and Protecting Communication Metadata – Ludovic Barman

Sep 17 2021

CALYPSO: Private Data Management for Decentralized Ledgers

Aug 16 2021

Technologizing Democracy or Democratizing Technology? A Layered-Architecture Perspective on Potentials and Challenges

Feb 1 2021

Identity and Personhood in Digital Democracy: Evaluating Inclusion, Equality, Security, and Privacy in Pseudonym Parties and Other Proofs of Personhood

Nov 4 2020

Design choices for Central Bank Digital Currency

Jul 23 2020

PriFi: Low-Latency Anonymity for Organizational Networks

Jul 13 2020

Secure, Confidential Blockchains Providing High Throughput and Low Latency – Eleftherios Kokoris Kogias

Sep 27 2019

Reducing Metadata Leakage from Encrypted Files and Communication with PURBs

Jul 18 2019

MorphIT: Morphing Packet Reports for Internet Transparency

May 4 2019

MedChain: Accountable and Auditable Data Sharing in Distributed Medical Scenarios

Mar 25 2019

Rethinking Priorities: Should Identity Systems Divide or Unite People?

Feb 8 2019

So They're Selling You a Blockchain

Sep 11 2018

MedCo: Enabling Secure and Privacy-Conscious Exploration of Distributed Clinical and Genomic Data

Jul 13 2018

On Enforcing the Digital Immunity of a Large Humanitarian Organization

May 22 2018

Atom: Horizontally Scaling Strong Anonymity

Oct 30 2017

UnLynx: A Decentralized System for Privacy-Conscious Data Sharing

Jul 19 2017

Technology Governs Us. Will it Govern Us Well?

Jun 23 2017

Proof-of-Personhood: Redemocratizing Permissionless Cryptocurrencies

Apr 29 2017

Multiple Objectives of Lawful-Surveillance Protocols

Mar 20 2017

Privacy-Preserving Lawful Contact Chaining

Oct 24 2016

Riffle: An Efficient Communication System With Strong Anonymity

Jul 19 2016

Open, privacy-preserving protocols for lawful surveillance

Jul 13 2016

AnonRep: Towards Tracking-Resistant Anonymous Reputation

Mar 16 2016

Building Privacy-Preserving Cryptographic Credentials from Federated Online Identities

Mar 16 2016

Metadata Protection Considerations for TLS Present and Future

Feb 21 2016

Let's verify real people, not real names.

Oct 7 2015

Seeking Anonymity in an Internet Panopticon

Oct 1 2015

A Flexible Architecture for Structural Reliability Auditing to the Clouds – Ennan Zhai

Aug 11 2015

Identity Management through Privacy-Preserving Authentication – Ewa Syta

Aug 11 2015

Private Eyes: Secure Remote Biometric Authentication

Jul 20 2015

Building Privacy-Preserving Cryptographic Credentials from Federated Online Identities – John Maheswaran

Jun 24 2015

Open Surveillance

Oct 21 2014

Heading Off Correlated Failures through Independence-as-a-Service

Oct 7 2014

Catching Bandits and Only Bandits: Privacy-Preserving Intersection Warrants for Lawful Surveillance

Aug 18 2014

Managing NymBoxes for Identity and Tracking Protection

Aug 1 2014

Security Analysis of Accountable Anonymity in Dissent

Aug 1 2014

A TorPath to TorCoin: Proof-of-Bandwidth Altcoins for Compensating Relays

Jul 18 2014

From Onions to Shallots: Rewarding Tor Relays with TEARS

Jul 18 2014

Crypto-Book: An Architecture for Privacy Preserving Online Identities

Nov 22 2013

Structural Cloud Audits that Protect Private Information

Nov 8 2013

Conscript Your Friends into Larger Anonymity Sets with JavaScript

Nov 4 2013

Ensuring High-Quality Randomness in Cryptographic Key Generation

Nov 4 2013

Hang With Your Buddies to Resist Intersection Attacks

Nov 4 2013

An Untold Story of Redundant Clouds: Making Your Service Deployment Truly Reliable

Nov 3 2013

Proactively Accountable Anonymous Messaging in Verdict

Aug 14 2013

Reducing Latency in Tor Circuits with Unordered Delivery

Aug 13 2013

Welcome to the World of Human Rights: Please Make Yourself Uncomfortable

May 23 2013

Dissent in Numbers: Making Strong Anonymity Scale

Oct 8 2012

Scavenging for Anonymity with BlogDrop

Jul 9 2012

Strong Theft-Proof Privacy-Preserving Biometric Authentication

May 25 2012

Faceless: Decentralized Anonymous Group Messaging for Online Social Networks

Apr 10 2012

Scalable Anonymous Group Communication in the Anytrust Model

Apr 10 2012

Dissent: Accountable Anonymous Group Messaging

Oct 4 2010

An Offline Foundation for Online Accountable Pseudonyms

Apr 1 2008

Sybil Parties: An Offline Foundation for Online Accountability

Sep 24 2006

E-Vote Your Conscience: Perceptions of Coercion and Vote Buying, and the Usability of Fake Credentials in Online Voting

May 20 2024

ZeroAuction: Zero-Deposit Sealed-bid Auction via Delayed Execution

Mar 8 2024

Authenticated Private Information Retrieval

Aug 10 2023

Flash Freezing Flash Boys: Countering Blockchain Front-Running

Jul 10 2022

Auditing the Swiss Post E-voting System: An Architectural Perspective

Apr 4 2022

TRIP: Trustless Coercion-Resistant In-Person Voter Registration

Feb 14 2022

Integrity and Metadata Protection in Data Retrieval – Kirill Nikitin

Nov 26 2021

Privacy-Preserving Federated Analytics using Multiparty Homomorphic Encryption – David Jules Froelicher

Oct 1 2021

Analyzing and Protecting Communication Metadata – Ludovic Barman

Sep 17 2021

CALYPSO: Private Data Management for Decentralized Ledgers

Aug 16 2021

Technologizing Democracy or Democratizing Technology? A Layered-Architecture Perspective on Potentials and Challenges

Feb 1 2021

Identity and Personhood in Digital Democracy: Evaluating Inclusion, Equality, Security, and Privacy in Pseudonym Parties and Other Proofs of Personhood

Nov 4 2020

Design choices for Central Bank Digital Currency

Jul 23 2020

PriFi: Low-Latency Anonymity for Organizational Networks

Jul 13 2020

Secure, Confidential Blockchains Providing High Throughput and Low Latency – Eleftherios Kokoris Kogias

Sep 27 2019

Rationality is Self-Defeating in Permissionless Systems

Sep 23 2019

Reducing Metadata Leakage from Encrypted Files and Communication with PURBs

Jul 18 2019

On the Security of Two-Round Multi-Signatures

May 20 2019

MedChain: Accountable and Auditable Data Sharing in Distributed Medical Scenarios

Mar 25 2019

The Remote Voting Minefield: from North Carolina to Switzerland

Feb 22 2019

So They're Selling You a Blockchain

Sep 11 2018

MedCo: Enabling Secure and Privacy-Conscious Exploration of Distributed Clinical and Genomic Data

Jul 13 2018

OmniLedger: A Secure, Scale-Out, Decentralized Ledger via Sharding

May 22 2018

On Enforcing the Digital Immunity of a Large Humanitarian Organization

May 22 2018

CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds

Aug 18 2017

UnLynx: A Decentralized System for Privacy-Conscious Data Sharing

Jul 19 2017

Scalable Bias-Resistant Distributed Randomness

May 23 2017

Multiple Objectives of Lawful-Surveillance Protocols

Mar 20 2017

Untangling Mining Incentives in Bitcoin and ByzCoin

Oct 25 2016

Privacy-Preserving Lawful Contact Chaining

Oct 24 2016

Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing

Aug 10 2016

Riffle: An Efficient Communication System With Strong Anonymity

Jul 19 2016

Open, privacy-preserving protocols for lawful surveillance

Jul 13 2016

Keeping Authorities “Honest or Bust” with Decentralized Witness Cosigning

May 23 2016

AnonRep: Towards Tracking-Resistant Anonymous Reputation

Mar 16 2016

Building Privacy-Preserving Cryptographic Credentials from Federated Online Identities

Mar 16 2016

Apple, FBI, and Software Transparency

Mar 10 2016

Collectively Witnessing Log Servers in CT

Oct 20 2015

Deterministically Deterring Timing Attacks in Deterland

Oct 4 2015

Seeking Anonymity in an Internet Panopticon

Oct 1 2015

A Flexible Architecture for Structural Reliability Auditing to the Clouds – Ennan Zhai

Aug 11 2015

Identity Management through Privacy-Preserving Authentication – Ewa Syta

Aug 11 2015

Warding off Timing Channels in Deterland – Weiyi Wu

Aug 10 2015

Private Eyes: Secure Remote Biometric Authentication

Jul 20 2015

Certificate Cothority: Towards Trustworthy Collective CAs

Jul 2 2015

Building Privacy-Preserving Cryptographic Credentials from Federated Online Identities – John Maheswaran

Jun 24 2015

Open Surveillance

Oct 21 2014

Heading Off Correlated Failures through Independence-as-a-Service

Oct 7 2014

Catching Bandits and Only Bandits: Privacy-Preserving Intersection Warrants for Lawful Surveillance

Aug 18 2014

Managing NymBoxes for Identity and Tracking Protection

Aug 1 2014

Security Analysis of Accountable Anonymity in Dissent

Aug 1 2014

A TorPath to TorCoin: Proof-of-Bandwidth Altcoins for Compensating Relays

Jul 18 2014

From Onions to Shallots: Rewarding Tor Relays with TEARS

Jul 18 2014

Crypto-Book: An Architecture for Privacy Preserving Online Identities

Nov 22 2013

Structural Cloud Audits that Protect Private Information

Nov 8 2013

Conscript Your Friends into Larger Anonymity Sets with JavaScript

Nov 4 2013

Ensuring High-Quality Randomness in Cryptographic Key Generation

Nov 4 2013

Hang With Your Buddies to Resist Intersection Attacks

Nov 4 2013

An Untold Story of Redundant Clouds: Making Your Service Deployment Truly Reliable

Nov 3 2013

Proactively Accountable Anonymous Messaging in Verdict

Aug 14 2013

Reducing Latency in Tor Circuits with Unordered Delivery

Aug 13 2013

Welcome to the World of Human Rights: Please Make Yourself Uncomfortable

May 23 2013

Enhancing the OS against Security Threats in System Administration

Dec 3 2012

Dissent in Numbers: Making Strong Anonymity Scale

Oct 8 2012

Plugging Side-Channel Leaks with Timing Information Flow Control

Jun 13 2012

Icebergs in the Clouds: the Other Risks of Cloud Computing

Jun 12 2012

Strong Theft-Proof Privacy-Preserving Biometric Authentication

May 25 2012

Scalable Anonymous Group Communication in the Anytrust Model

Apr 10 2012

CertiKOS: A Certified Kernel for Secure Cloud Computing

Jul 11 2011

Determinating Timing Channels in Compute Clouds

Oct 8 2010

Efficient System-Enforced Deterministic Parallelism

Oct 5 2010

Advanced Development of Certified OS Kernels

Jul 15 2010

Unintended Consequences of NAT Deployments with Overlapping Address Space

Feb 1 2010

UIA: A Global Connectivity Architecture for Mobile Personal Devices

Sep 1 2008

Vx32: Lightweight User-level Sandboxing on the x86

Jun 27 2008

An Offline Foundation for Online Accountable Pseudonyms

Apr 1 2008

Structured Streams: a New Transport Abstraction

Aug 27 2007

Persistent Personal Names for Globally Connected Mobile Devices

Nov 6 2006

Sybil Parties: An Offline Foundation for Online Accountability

Sep 24 2006

User-Relative Names for Globally Connected Personal Devices

Feb 27 2006

VXA: A Virtual Architecture for Durable Compressed Archives

Dec 16 2005

The Flux OSKit: A Substrate for Kernel and Language Research

Oct 6 1997

The Flux OS Toolkit: Reusable Components for OS Implementation

May 5 1997

Microkernels Meet Recursive Virtual Machines

Oct 30 1996

The Persistent Relevance of the Local Operating System to Global Applications

Sep 9 1996

E-Vote Your Conscience: Perceptions of Coercion and Vote Buying, and the Usability of Fake Credentials in Online Voting

May 20 2024

Authenticated Private Information Retrieval

Aug 10 2023

Toward Internet Performance Transparency – Georgia Fragkouli

Aug 29 2022

Auditing the Swiss Post E-voting System: An Architectural Perspective

Apr 4 2022

TRIP: Trustless Coercion-Resistant In-Person Voter Registration

Feb 14 2022

Integrity and Metadata Protection in Data Retrieval – Kirill Nikitin

Nov 26 2021

AI for Governance Belongs in Mechanism, Not Policy

Nov 18 2020

Identity and Personhood in Digital Democracy: Evaluating Inclusion, Equality, Security, and Privacy in Pseudonym Parties and Other Proofs of Personhood

Nov 4 2020

MorphIT: Morphing Packet Reports for Internet Transparency

May 4 2019

CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds

Aug 18 2017

How Do You Know It's On the Blockchain? With a SkipChain.

Aug 1 2017

UnLynx: A Decentralized System for Privacy-Conscious Data Sharing

Jul 19 2017

Keeping Authorities “Honest or Bust” with Decentralized Witness Cosigning

May 23 2016

Apple, FBI, and Software Transparency

Mar 10 2016

Collectively Witnessing Log Servers in CT

Oct 20 2015

A Flexible Architecture for Structural Reliability Auditing to the Clouds – Ennan Zhai

Aug 11 2015

Certificate Cothority: Towards Trustworthy Collective CAs

Jul 2 2015

Heading Off Correlated Failures through Independence-as-a-Service

Oct 7 2014

Structural Cloud Audits that Protect Private Information

Nov 8 2013

An Untold Story of Redundant Clouds: Making Your Service Deployment Truly Reliable

Nov 3 2013

Device Transparency: a New Model for Mobile Storage

Oct 11 2009


Bryan Ford