Home - Topics - Publications - Blog - CV - Photos - Funny

Security

Rationality is Self-Defeating in Permissionless Systems

Sep 23 2019

Reducing Metadata Leakage from Encrypted Files and Communication with PURBs

Jul 18 2019

On the Security of Two-Round Multi-Signatures

May 20 2019

The Remote Voting Minefield: from North Carolina to Switzerland

Feb 22 2019

So They're Selling You a Blockchain

Sep 11 2018

MedCo: Enabling Secure and Privacy-Conscious Exploration of Distributed Clinical and Genomic Data

Jul 13 2018

OmniLedger: A Secure, Scale-Out, Decentralized Ledger via Sharding

May 22 2018

On Enforcing the Digital Immunity of a Large Humanitarian Organization

May 22 2018

CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds

Aug 18 2017

UnLynx: A Decentralized System for Privacy-Conscious Data Sharing

Jul 19 2017

Scalable Bias-Resistant Distributed Randomness

May 23 2017

Multiple Objectives of Lawful-Surveillance Protocols

Mar 20 2017

Untangling Mining Incentives in Bitcoin and ByzCoin

Oct 25 2016

PriFi: A Low-Latency and Tracking-Resistant Protocol for Local-Area Anonymous Communication

Oct 24 2016

Privacy-Preserving Lawful Contact Chaining

Oct 24 2016

Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing

Aug 10 2016

An Efficient Communication System With Strong Anonymity

Jul 19 2016

Keeping Authorities “Honest or Bust” with Decentralized Witness Cosigning

May 23 2016

AnonRep: Towards Tracking-Resistant Anonymous Reputation

Mar 16 2016

Building Privacy-Preserving Cryptographic Credentials from Federated Online Identities

Mar 16 2016

Apple, FBI, and Software Transparency

Mar 10 2016

Collectively Witnessing Log Servers in CT

Oct 20 2015

Deterministically Deterring Timing Attacks in Deterland

Oct 4 2015

Seeking Anonymity in an Internet Panopticon

Oct 1 2015

Private Eyes: Secure Remote Biometric Authentication

Jul 20 2015

Certificate Cothority: Towards Trustworthy Collective CAs

Jul 2 2015

Heading Off Correlated Failures through Independence-as-a-Service

Oct 7 2014

Catching Bandits and Only Bandits: Privacy-Preserving Intersection Warrants for Lawful Surveillance

Aug 18 2014

Managing NymBoxes for Identity and Tracking Protection

Aug 1 2014

Security Analysis of Accountable Anonymity in Dissent

Aug 1 2014

A TorPath to TorCoin: Proof-of-Bandwidth Altcoins for Compensating Relays

Jul 18 2014

From Onions to Shallots: Rewarding Tor Relays with TEARS

Jul 18 2014

Crypto-Book: An Architecture for Privacy Preserving Online Identities

Nov 22 2013

Structural Cloud Audits that Protect Private Information

Nov 8 2013

Conscript Your Friends into Larger Anonymity Sets with JavaScript

Nov 4 2013

Ensuring High-Quality Randomness in Cryptographic Key Generation

Nov 4 2013

Hang With Your Buddies to Resist Intersection Attacks

Nov 4 2013

An Untold Story of Redundant Clouds: Making Your Service Deployment Truly Reliable

Nov 3 2013

Proactively Accountable Anonymous Messaging in Verdict

Aug 14 2013

Reducing Latency in Tor Circuits with Unordered Delivery

Aug 13 2013

Welcome to the World of Human Rights: Please Make Yourself Uncomfortable

May 23 2013

Enhancing the OS against Security Threats in System Administration

Dec 3 2012

Dissent in Numbers: Making Strong Anonymity Scale

Oct 8 2012

Plugging Side-Channel Leaks with Timing Information Flow Control

Jun 13 2012

Icebergs in the Clouds: the Other Risks of Cloud Computing

Jun 12 2012

Strong Theft-Proof Privacy-Preserving Biometric Authentication

May 25 2012

Scalable Anonymous Group Communication in the Anytrust Model

Apr 10 2012

CertiKOS: A Certified Kernel for Secure Cloud Computing

Jul 11 2011

Determinating Timing Channels in Compute Clouds

Oct 8 2010

Efficient System-Enforced Deterministic Parallelism

Oct 5 2010

Advanced Development of Certified OS Kernels

Jul 15 2010

Unintended Consequences of NAT Deployments with Overlapping Address Space

Feb 1 2010

UIA: A Global Connectivity Architecture for Mobile Personal Devices

Sep 1 2008

Vx32: Lightweight User-level Sandboxing on the x86

Jun 27 2008

An Offline Foundation for Online Accountable Pseudonyms

Apr 1 2008

Structured Streams: a New Transport Abstraction

Aug 27 2007

Persistent Personal Names for Globally Connected Mobile Devices

Nov 6 2006

User-Relative Names for Globally Connected Personal Devices

Feb 27 2006

VXA: A Virtual Architecture for Durable Compressed Archives

Dec 16 2005

The Flux OSKit: A Substrate for Kernel and Language Research

Oct 6 1997

The Flux OS Toolkit: Reusable Components for OS Implementation

May 5 1997

Microkernels Meet Recursive Virtual Machines

Oct 30 1996

The Persistent Relevance of the Local Operating System to Global Applications

Sep 9 1996


Bryan Ford