Bryan Ford

According to our database1, Bryan Ford authored at least 114 papers between 1993 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2020
CALYPSO: Private Data Management for Decentralized Ledgers.
Proc. VLDB Endow., 2020

PriFi: Low-Latency Anonymity for Organizational Networks.
Proc. Priv. Enhancing Technol., 2020

Identity and Personhood in Digital Democracy: Evaluating Inclusion, Equality, Security, and Privacy in Pseudonym Parties and Other Proofs of Personhood.
CoRR, 2020

Economic Principles of PoPCoin, a Democratic Time-based Cryptocurrency.
CoRR, 2020

A Liquid Perspective on Democratic Choice.
CoRR, 2020

Democratic Value and Money for Decentralized Digital Society.
CoRR, 2020

Que Sera Consensus: Simple Asynchronous Agreement with Private Coins and Threshold Logical Clocks.
CoRR, 2020

2019
MedCo: Enabling Secure and Privacy-Preserving Exploration of Distributed Clinical and Genomic Data.
IEEE ACM Trans. Comput. Biol. Bioinform., 2019

Reducing Metadata Leakage from Encrypted Files and Communication with PURBs.
Proc. Priv. Enhancing Technol., 2019

MorphIT: Morphing Packet Reports for Internet Transparency.
Proc. Priv. Enhancing Technol., 2019

Rationality is Self-Defeating in Permissionless Systems.
CoRR, 2019

Threshold Logical Clocks for Asynchronous Distributed Coordination and Consensus.
CoRR, 2019

On the Security of Two-Round Multi-Signatures.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Rethinking General-Purpose Decentralized Computing.
Proceedings of the Workshop on Hot Topics in Operating Systems, 2019

2018
Hidden in Plain Sight: Storing and Managing Secrets on a Public Ledger.
IACR Cryptol. ePrint Arch., 2018

Okamoto Beats Schnorr: On the Provable Security of Multi-Signatures.
IACR Cryptol. ePrint Arch., 2018

Reducing Metadata Leakage from Encrypted Files and Communication with PURBs.
CoRR, 2018

OmniLedger: A Secure, Scale-Out, Decentralized Ledger via Sharding.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

On Enforcing the Digital Immunity of a Large Humanitarian Organization.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

2017
UnLynx: A Decentralized System for Privacy-Conscious Data Sharing.
Proc. Priv. Enhancing Technol., 2017

CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds.
IACR Cryptol. ePrint Arch., 2017

OmniLedger: A Secure, Scale-Out, Decentralized Ledger.
IACR Cryptol. ePrint Arch., 2017

PriFi: A Low-Latency Local-Area Anonymous Communication Network.
CoRR, 2017

Multiple Objectives of Lawful-Surveillance Protocols.
Proceedings of the Security Protocols XXV, 2017

Atom: Horizontally Scaling Strong Anonymity.
Proceedings of the 26th Symposium on Operating Systems Principles, 2017

Proof-of-Personhood: Redemocratizing Permissionless Cryptocurrencies.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy Workshops, 2017

2016
Riffle: An Efficient Communication System With Strong Anonymity.
Proc. Priv. Enhancing Technol., 2016

Scalable Bias-Resistant Distributed Randomness.
IACR Cryptol. ePrint Arch., 2016

Open, privacy-preserving protocols for lawful surveillance.
CoRR, 2016

Atom: Scalable Anonymity Resistant to Traffic Analysis.
CoRR, 2016

Privacy-Preserving Lawful Contact Chaining: [Preliminary Report].
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, 2016

PriFi: A Low-Latency and Tracking-Resistant Protocol for Local-Area Anonymous Communication.
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, 2016

Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing.
Proceedings of the 25th USENIX Security Symposium, 2016

Keeping Authorities "Honest or Bust" with Decentralized Witness Cosigning.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

AnonRep: Towards Tracking-Resistant Anonymous Reputation.
Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation, 2016

Building Privacy-Preserving Cryptographic Credentials from Federated Online Identities.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

2015
Warding off timing attacks in Deterland.
CoRR, 2015

Decentralizing Authorities into Scalable Strongest-Link Cothorities.
CoRR, 2015

Seeking anonymity in an internet panopticon.
Commun. ACM, 2015

Private Eyes: Secure Remote Biometric Authentication.
Proceedings of the SECRYPT 2015, 2015

Hiding in a Panopticon - Grand Challenges in Internet Anonymity.
Proceedings of the ICISSP 2015, 2015

2014
GPUfs: Integrating a file system with GPUs.
ACM Trans. Comput. Syst., 2014

Security Analysis of Accountable Anonymity in Dissent.
ACM Trans. Inf. Syst. Secur., 2014

Crux: Locality-Preserving Distributed Systems.
CoRR, 2014

Crypto-Book: Bootstrapping Privacy Preserving Online Identities from Social Networks.
CoRR, 2014

GPUfs: the case for operating system services on GPUs.
Commun. ACM, 2014

Catching Bandits and Only Bandits: Privacy-Preserving Intersection Warrants for Lawful Surveillance.
Proceedings of the 4th USENIX Workshop on Free and Open Communications on the Internet, 2014

Heading Off Correlated Failures through Independence-as-a-Service.
Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation, 2014

Managing NymBoxes for Identity and Tracking Protection.
Proceedings of the 2014 Conference on Timely Results in Operating Systems, 2014

TAQ: enhancing fairness and performance predictability in small packet regimes.
Proceedings of the Ninth Eurosys Conference 2014, 2014

2013
WiNoN - Plugging the Leaky Boat of Web Anonymity.
CoRR, 2013

Conscript your friends into larger anonymity sets with JavaScript.
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013

Reducing Latency in Tor Circuits with Unordered Delivery.
Proceedings of the 3rd USENIX Workshop on Free and Open Communications on the Internet, 2013

Proactively Accountable Anonymous Messaging in Verdict.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

Maple: simplifying SDN programming using algorithmic policies.
Proceedings of the ACM SIGCOMM 2013 Conference, 2013

Crypto-Book: an architecture for privacy preserving online identities.
Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks, 2013

An untold story of redundant clouds: making your service deployment truly reliable.
Proceedings of the 9th Workshop on Hot Topics in Dependable Systems, 2013

Structural cloud audits that protect private information.
Proceedings of the CCSW'13, 2013

Hang with your buddies to resist intersection attacks.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Ensuring high-quality randomness in cryptographic key generation.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Lazy tree mapping: generalizing and scaling deterministic parallelism.
Proceedings of the Asia-Pacific Workshop on Systems, 2013

2012
Dining in the Sunshine: Verifiable Anonymous Communication with Verdict
CoRR, 2012

Efficient system-enforced deterministic parallelism.
Commun. ACM, 2012

Faceless: decentralized anonymous group messaging for online social networks.
Proceedings of the Fifth Workshop on Social Network Systems, 2012

Dissent in Numbers: Making Strong Anonymity Scale.
Proceedings of the 10th USENIX Symposium on Operating Systems Design and Implementation, 2012

Fitting Square Pegs Through Round Pipes: Unordered Delivery Wire-Compatible with TCP and TLS.
Proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation, 2012

Enhancing the OS against Security Threats in System Administration.
Proceedings of the Middleware 2012, 2012

Non-Linear Compression: Gzip Me Not!
Proceedings of the 4th USENIX Workshop on Hot Topics in Storage and File Systems, 2012

Icebergs in the Clouds: The Other Risks of Cloud Computing.
Proceedings of the 4th USENIX Workshop on Hot Topics in Cloud Computing, 2012

Plugging Side-Channel Leaks with Timing Information Flow Control.
Proceedings of the 4th USENIX Workshop on Hot Topics in Cloud Computing, 2012

2011
Wire-Compatible Unordered Delivery in TCP and TLS
CoRR, 2011

A Dynamic Recursive Unified Internet Design (DRUID).
Comput. Networks, 2011

Eyo: Device-Transparent Personal Storage.
Proceedings of the 2011 USENIX Annual Technical Conference, 2011

TCP behavior in sub packet regimes.
Proceedings of the SIGMETRICS 2011, 2011

Deterministic OpenMP for Race-Free Parallelism.
Proceedings of the 3rd USENIX Workshop on Hot Topics in Parallelism, 2011

A virtual memory foundation for scalable deterministic parallelism.
Proceedings of the APSys '11 Asia Pacific Workshop on Systems, 2011

CertiKOS: a certified kernel for secure cloud computing.
Proceedings of the APSys '11 Asia Pacific Workshop on Systems, 2011

2010
Unintended Consequences of NAT Deployments with Overlapping Address Space.
RFC, February, 2010

Device transparency: a new model for mobile storage.
ACM SIGOPS Oper. Syst. Rev., 2010

Accountable Anonymous Group Messaging
CoRR, 2010

Determinating Timing Channels in Statistically Multiplexed Clouds
CoRR, 2010

Dissent: accountable anonymous group messaging.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Determinating timing channels in compute clouds.
Proceedings of the 2nd ACM Cloud Computing Security Workshop, 2010

2009
NAT Behavioral Requirements for ICMP.
RFC, April, 2009

Deterministic Execution for Multicore and Cloud Computing
CoRR, 2009

Flow Splitting with Fate Sharing in a Next Generation Transport Services Architecture
CoRR, 2009

Efficient Cross-Layer Negotiation.
Proceedings of the Eight ACM Workshop on Hot Topics in Networks (HotNets-VIII), 2009

2008
NAT Behavioral Requirements for TCP.
RFC, October, 2008

State of Peer-to-Peer (P2P) Communication across Network Address Translators (NATs).
RFC, March, 2008

Global connectivity architecture of mobile personal devices.
PhD thesis, 2008

Vx32: Lightweight User-level Sandboxing on the x86.
Proceedings of the 2008 USENIX Annual Technical Conference, 2008

An offline foundation for online accountable pseudonyms.
Proceedings of the 1st Workshop on Social Network Systems, 2008

Breaking Up the Transport Logjam.
Proceedings of the 7th ACM Workshop on Hot Topics in Networks, 2008

2007
Structured streams: a new transport abstraction.
Proceedings of the ACM SIGCOMM 2007 Conference on Applications, 2007

Alpaca: extensible authorization for distributed services.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

2006
Packrat Parsing: Simple, Powerful, Lazy, Linear Time
CoRR, 2006

Persistent Personal Names for Globally Connected Mobile Devices.
Proceedings of the 7th Symposium on Operating Systems Design and Implementation (OSDI '06), 2006

User-Relative Names for Globally Connected Personal Devices.
Proceedings of the 5th International workshop on Peer-To-Peer Systems, 2006

2005
Peer-to-Peer Communication Across Network Address Translators.
Proceedings of the 2005 USENIX Annual Technical Conference, 2005

VXA: A Virtual Architecture for Durable Compressed Archives.
Proceedings of the FAST '05 Conference on File and Storage Technologies, 2005

2004
Unmanaged Internet Protocol: taming the edge network management crisis.
Comput. Commun. Rev., 2004

Parsing expression grammars: a recognition-based syntactic foundation.
Proceedings of the 31st ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2004

2002
Packrat parsing: : simple, powerful, lazy, linear time, functional pearl.
Proceedings of the Seventh ACM SIGPLAN International Conference on Functional Programming (ICFP '02), 2002

1999
Interface and Execution Models in the Fluke Kernel.
Proceedings of the Third USENIX Symposium on Operating Systems Design and Implementation (OSDI), 1999

1997
The Flux OSKit: A Substrate for Kernel and Language Research.
Proceedings of the Sixteenth ACM Symposium on Operating System Principles, 1997

Flick: A Flexible, Optimizing IDL Compiler.
Proceedings of the ACM SIGPLAN '97 Conference on Programming Language Design and Implementation (PLDI), 1997

The Flux OS Toolkit: Reusable Components for OS Implementation.
Proceedings of The Sixth Workshop on Hot Topics in Operating Systems, 1997

1996
The persistent relevance of the local operating system to global applications.
Proceedings of the 7th ACM SIGOPS European Workshop: Systems Support for Worldwide Applications, 1996

CPU Inheritance Scheduling.
Proceedings of the Second USENIX Symposium on Operating Systems Design and Implementation (OSDI), 1996

Microkernels Meet Recursive Virtual Machines.
Proceedings of the Second USENIX Symposium on Operating Systems Design and Implementation (OSDI), 1996

1995
Using Annotated Interface Definitions to Optimize RPC.
Proceedings of the Fifteenth ACM Symposium on Operating System Principles, 1995

1994
Evolving Mach 3.0 to A Migrating Thread Model.
Proceedings of the USENIX Winter 1994 Technical Conference, 1994

1993
In-Kernel Servers on Mach 3.0: Implementation and Performance.
Proceedings of the USENIX MACH III Symposium, Santa Fe, New Mexico, USA, April 19-21, 1993, 1993

FLEX: A Tool for Building Efficient and Flexible Systems.
Proceedings of the Proceedings Fourth Workshop on Workstation Operating Systems, 1993


  Loading...