Home - Topics - Publications - Blog - CV - Photos - Funny

Privacy

Technologizing Democracy or Democratizing Technology? A Layered-Architecture Perspective on Potentials and Challenges

Jan 30 2020

Reducing Metadata Leakage from Encrypted Files and Communication with PURBs

Jul 18 2019

MorphIT: Morphing Packet Reports for Internet Transparency

May 4 2019

Rethinking Priorities: Should Identity Systems Divide or Unite People?

Feb 8 2019

So They're Selling You a Blockchain

Sep 11 2018

MedCo: Enabling Secure and Privacy-Conscious Exploration of Distributed Clinical and Genomic Data

Jul 13 2018

On Enforcing the Digital Immunity of a Large Humanitarian Organization

May 22 2018

Atom: Horizontally Scaling Strong Anonymity

Oct 30 2017

UnLynx: A Decentralized System for Privacy-Conscious Data Sharing

Jul 19 2017

Technology Governs Us. Will it Govern Us Well?

Jun 23 2017

Proof-of-Personhood: Redemocratizing Permissionless Cryptocurrencies

Apr 29 2017

Multiple Objectives of Lawful-Surveillance Protocols

Mar 20 2017

PriFi: A Low-Latency and Tracking-Resistant Protocol for Local-Area Anonymous Communication

Oct 24 2016

Privacy-Preserving Lawful Contact Chaining

Oct 24 2016

An Efficient Communication System With Strong Anonymity

Jul 19 2016

AnonRep: Towards Tracking-Resistant Anonymous Reputation

Mar 16 2016

Building Privacy-Preserving Cryptographic Credentials from Federated Online Identities

Mar 16 2016

Metadata Protection Considerations for TLS Present and Future

Feb 21 2016

Let's verify real people, not real names.

Oct 7 2015

Seeking Anonymity in an Internet Panopticon

Oct 1 2015

Private Eyes: Secure Remote Biometric Authentication

Jul 20 2015

Heading Off Correlated Failures through Independence-as-a-Service

Oct 7 2014

Catching Bandits and Only Bandits: Privacy-Preserving Intersection Warrants for Lawful Surveillance

Aug 18 2014

Managing NymBoxes for Identity and Tracking Protection

Aug 1 2014

Security Analysis of Accountable Anonymity in Dissent

Aug 1 2014

A TorPath to TorCoin: Proof-of-Bandwidth Altcoins for Compensating Relays

Jul 18 2014

From Onions to Shallots: Rewarding Tor Relays with TEARS

Jul 18 2014

Crypto-Book: An Architecture for Privacy Preserving Online Identities

Nov 22 2013

Structural Cloud Audits that Protect Private Information

Nov 8 2013

Conscript Your Friends into Larger Anonymity Sets with JavaScript

Nov 4 2013

Ensuring High-Quality Randomness in Cryptographic Key Generation

Nov 4 2013

Hang With Your Buddies to Resist Intersection Attacks

Nov 4 2013

An Untold Story of Redundant Clouds: Making Your Service Deployment Truly Reliable

Nov 3 2013

Proactively Accountable Anonymous Messaging in Verdict

Aug 14 2013

Reducing Latency in Tor Circuits with Unordered Delivery

Aug 13 2013

Welcome to the World of Human Rights: Please Make Yourself Uncomfortable

May 23 2013

Dissent in Numbers: Making Strong Anonymity Scale

Oct 8 2012

Scavenging for Anonymity with BlogDrop

Jul 9 2012

Strong Theft-Proof Privacy-Preserving Biometric Authentication

May 25 2012

Faceless: Decentralized Anonymous Group Messaging for Online Social Networks

Apr 10 2012

Scalable Anonymous Group Communication in the Anytrust Model

Apr 10 2012

Dissent: Accountable Anonymous Group Messaging

Oct 4 2010

An Offline Foundation for Online Accountable Pseudonyms

Apr 1 2008


Bryan Ford