Home - Topics - Papers - Theses - Blog - CV - Photos - Funny


E-Vote Your Conscience: Perceptions of Coercion and Vote Buying, and the Usability of Fake Credentials in Online Voting

May 20 2024

ZeroAuction: Zero-Deposit Sealed-bid Auction via Delayed Execution

Mar 8 2024

Authenticated Private Information Retrieval

Aug 10 2023

Toward Internet Performance Transparency – Georgia Fragkouli

Aug 29 2022

Auditing the Swiss Post E-voting System: An Architectural Perspective

Apr 4 2022

3PBCS: A Privacy-Preserving, Personhood-Based Credential System – Ksandros Apostoli

Mar 22 2022

Moby: A Blackout-Resistant Anonymity Network for Mobile Devices

Mar 16 2022

TRIP: Trustless Coercion-Resistant In-Person Voter Registration

Feb 14 2022

Integrity and Metadata Protection in Data Retrieval – Kirill Nikitin

Nov 26 2021

Privacy-Preserving Federated Analytics using Multiparty Homomorphic Encryption – David Jules Froelicher

Oct 1 2021

Analyzing and Protecting Communication Metadata – Ludovic Barman

Sep 17 2021

CALYPSO: Private Data Management for Decentralized Ledgers

Aug 16 2021

Technologizing Democracy or Democratizing Technology? A Layered-Architecture Perspective on Potentials and Challenges

Feb 1 2021

Identity and Personhood in Digital Democracy: Evaluating Inclusion, Equality, Security, and Privacy in Pseudonym Parties and Other Proofs of Personhood

Nov 4 2020

Design choices for Central Bank Digital Currency

Jul 23 2020

PriFi: Low-Latency Anonymity for Organizational Networks

Jul 13 2020

Secure, Confidential Blockchains Providing High Throughput and Low Latency – Eleftherios Kokoris Kogias

Sep 27 2019

Reducing Metadata Leakage from Encrypted Files and Communication with PURBs

Jul 18 2019

MorphIT: Morphing Packet Reports for Internet Transparency

May 4 2019

MedChain: Accountable and Auditable Data Sharing in Distributed Medical Scenarios

Mar 25 2019

Rethinking Priorities: Should Identity Systems Divide or Unite People?

Feb 8 2019

So They're Selling You a Blockchain

Sep 11 2018

MedCo: Enabling Secure and Privacy-Conscious Exploration of Distributed Clinical and Genomic Data

Jul 13 2018

On Enforcing the Digital Immunity of a Large Humanitarian Organization

May 22 2018

Atom: Horizontally Scaling Strong Anonymity

Oct 30 2017

UnLynx: A Decentralized System for Privacy-Conscious Data Sharing

Jul 19 2017

Technology Governs Us. Will it Govern Us Well?

Jun 23 2017

Proof-of-Personhood: Redemocratizing Permissionless Cryptocurrencies

Apr 29 2017

Multiple Objectives of Lawful-Surveillance Protocols

Mar 20 2017

Privacy-Preserving Lawful Contact Chaining

Oct 24 2016

Riffle: An Efficient Communication System With Strong Anonymity

Jul 19 2016

Open, privacy-preserving protocols for lawful surveillance

Jul 13 2016

AnonRep: Towards Tracking-Resistant Anonymous Reputation

Mar 16 2016

Building Privacy-Preserving Cryptographic Credentials from Federated Online Identities

Mar 16 2016

Metadata Protection Considerations for TLS Present and Future

Feb 21 2016

Let's verify real people, not real names.

Oct 7 2015

Seeking Anonymity in an Internet Panopticon

Oct 1 2015

A Flexible Architecture for Structural Reliability Auditing to the Clouds – Ennan Zhai

Aug 11 2015

Identity Management through Privacy-Preserving Authentication – Ewa Syta

Aug 11 2015

Private Eyes: Secure Remote Biometric Authentication

Jul 20 2015

Building Privacy-Preserving Cryptographic Credentials from Federated Online Identities – John Maheswaran

Jun 24 2015

Open Surveillance

Oct 21 2014

Heading Off Correlated Failures through Independence-as-a-Service

Oct 7 2014

Catching Bandits and Only Bandits: Privacy-Preserving Intersection Warrants for Lawful Surveillance

Aug 18 2014

Managing NymBoxes for Identity and Tracking Protection

Aug 1 2014

Security Analysis of Accountable Anonymity in Dissent

Aug 1 2014

A TorPath to TorCoin: Proof-of-Bandwidth Altcoins for Compensating Relays

Jul 18 2014

From Onions to Shallots: Rewarding Tor Relays with TEARS

Jul 18 2014

Crypto-Book: An Architecture for Privacy Preserving Online Identities

Nov 22 2013

Structural Cloud Audits that Protect Private Information

Nov 8 2013

Conscript Your Friends into Larger Anonymity Sets with JavaScript

Nov 4 2013

Ensuring High-Quality Randomness in Cryptographic Key Generation

Nov 4 2013

Hang With Your Buddies to Resist Intersection Attacks

Nov 4 2013

An Untold Story of Redundant Clouds: Making Your Service Deployment Truly Reliable

Nov 3 2013

Proactively Accountable Anonymous Messaging in Verdict

Aug 14 2013

Reducing Latency in Tor Circuits with Unordered Delivery

Aug 13 2013

Welcome to the World of Human Rights: Please Make Yourself Uncomfortable

May 23 2013

Dissent in Numbers: Making Strong Anonymity Scale

Oct 8 2012

Scavenging for Anonymity with BlogDrop

Jul 9 2012

Strong Theft-Proof Privacy-Preserving Biometric Authentication

May 25 2012

Faceless: Decentralized Anonymous Group Messaging for Online Social Networks

Apr 10 2012

Scalable Anonymous Group Communication in the Anytrust Model

Apr 10 2012

Dissent: Accountable Anonymous Group Messaging

Oct 4 2010

An Offline Foundation for Online Accountable Pseudonyms

Apr 1 2008

Sybil Parties: An Offline Foundation for Online Accountability

Sep 24 2006

Bryan Ford