Bryan Ford's Home Page
TRIP: Coercion-resistant Registration for E-Voting with Verifiability and Usability in Votegral
Robust and High-Performance Wide-Area Consensus Protocols
Beyond the ratchet: practical challenges in secure messaging
Coercion-Resistant E-voting and Proof of Personhood
Towards Real Democratic DAOs
Towards practical and efficient performance robustness: QuePaxa and beyond
E-Vote Your Conscience: Perceptions of Coercion and Vote Buying, and the Usability of Fake Credentials in Online Voting
Can decentralized systems be truly “democratizing” – and how?
ZeroAuction: Zero-Deposit Sealed-bid Auction via Delayed Execution
Towards General-Purpose Decentralized Computing with Permissionless Extensibility
What Distributed Infrastructure Could Save the Planet?
QuePaxa: Escaping the Tyranny of Timeouts in Consensus
Authenticated Private Information Retrieval
Building Strongly-Consistent Systems Resilient to Failures, Partitions, and Slowdowns
Privacy-Preserving Personhood-Based Credentials
Matchertext: an escape route from language-embedding hell?
Matchertext: Towards Verbatim Interlanguage Embedding
MinML: concise but general markup syntax
Toward Internet Performance Transparency
Flash Freezing Flash Boys: Countering Blockchain Front-Running
Who – Or What – Will Our Distributed Metaverse Serve?
Auditing the Swiss Post E-voting System: An Architectural Perspective
3PBCS: A Privacy-Preserving, Personhood-Based Credential System
Moby: A Blackout-Resistant Anonymity Network for Mobile Devices
Digital Personhood: Towards Technology that Securely Serves People
Integrity and Metadata Protection in Data Retrieval
Immunizing Systems from Distant Failures by Limiting Lamport Exposure
Decentralized Finance: for the few, the many, or everyone?
Consensus for Decentralized Ledgers
Digital Personhood: Towards Technology that Securely Serves People
Privacy-Preserving Federated Analytics using Multiparty Homomorphic Encryption
Analyzing and Protecting Communication Metadata
CALYPSO: Private Data Management for Decentralized Ledgers
Votegral: Coercion-Resistant E-voting Without Trusted Hardware
Proof of Personhood: Introduction and Challenges
Technologizing Democracy or Democratizing Technology? A Layered-Architecture Perspective on Potentials and Challenges
AI for Governance Belongs in Mechanism, Not Policy
Personhood Online: Privacy, Transparency, and Inclusion for Digital Democracy
Identity and Personhood in Digital Democracy: Evaluating Inclusion, Equality, Security, and Privacy in Pseudonym Parties and Other Proofs of Personhood
Distributed Randomness
Design choices for Central Bank Digital Currency
PriFi: Low-Latency Anonymity for Organizational Networks
Que Sera Consensus: Simple Asynchronous Agreement with Private Coins and Threshold Logical Clocks
Blockchain: Between Hype and Reality
Blockchain, Privacy, and Accountability
Digital Architecture for Trust in the 21st Century
Voting and Blockchain: Promise and Challenges
Secure, Confidential Blockchains Providing High Throughput and Low Latency
Rationality is Self-Defeating in Permissionless Systems
Are Only Type Parameters Generic Enough for Go 2 Generics?
Reducing Metadata Leakage from Encrypted Files and Communication with PURBs
Threshold Logical Clocks for Asynchronous Distributed Coordination and Consensus
On the Security of Two-Round Multi-Signatures
Rethinking General-Purpose Decentralized Computing
MorphIT: Morphing Packet Reports for Internet Transparency
MedChain: Accountable and Auditable Data Sharing in Distributed Medical Scenarios
The Remote Voting Minefield: from North Carolina to Switzerland
Rethinking Priorities: Should Identity Systems Divide or Unite People?
Are Biometrics a Good Test for Real Unique Personhood?
A Liquid Perspective on Democratic Choice
So They're Selling You a Blockchain
MedCo: Enabling Secure and Privacy-Conscious Exploration of Distributed Clinical and Genomic Data
International Scientific Conferences Must Leave the U.S.
Sightseeing Around Lausanne
Democratic Value and Money for Decentralized Digital Society
OmniLedger: A Secure, Scale-Out, Decentralized Ledger via Sharding
On Enforcing the Digital Immunity of a Large Humanitarian Organization
Secure, Scalable Proof-of-Stake Blockchains
Atom: Horizontally Scaling Strong Anonymity
CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds
How Do You Know It's On the Blockchain? With a SkipChain.
UnLynx: A Decentralized System for Privacy-Conscious Data Sharing
Technology Governs Us. Will it Govern Us Well?
Scalable Bias-Resistant Distributed Randomness
Proof-of-Personhood: Redemocratizing Permissionless Cryptocurrencies
Multiple Objectives of Lawful-Surveillance Protocols
Selfish Mining in Bitcoin and ByzCoin
Untangling Mining Incentives in Bitcoin and ByzCoin
Privacy-Preserving Lawful Contact Chaining
Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing
Riffle: An Efficient Communication System With Strong Anonymity
Open, privacy-preserving protocols for lawful surveillance
Keeping Authorities “Honest or Bust” with Decentralized Witness Cosigning
AnonRep: Towards Tracking-Resistant Anonymous Reputation
Building Privacy-Preserving Cryptographic Credentials from Federated Online Identities
Apple, FBI, and Software Transparency
An advanced crypto library for Go
Backdoors, Trusted Servers, and Deanonymization
How to prove DNSSEC isn't a key escrow scheme
Metadata Protection Considerations for TLS Present and Future
Collectively Witnessing Log Servers in CT
Let's verify real people, not real names.
Deterministically Deterring Timing Attacks in Deterland
Seeking Anonymity in an Internet Panopticon
A Flexible Architecture for Structural Reliability Auditing to the Clouds
Identity Management through Privacy-Preserving Authentication
Warding off Timing Channels in Deterland
Private Eyes: Secure Remote Biometric Authentication
Certificate Cothority: Towards Trustworthy Collective CAs
Building Privacy-Preserving Cryptographic Credentials from Federated Online Identities
About
GPUfs: The Case for Operating System Services on GPUs
Delegative Democracy Revisited
Faculty size and growth in the top 20 Computer Science departments
Open Surveillance
Heading Off Correlated Failures through Independence-as-a-Service
Catching Bandits and Only Bandits: Privacy-Preserving Intersection Warrants for Lawful Surveillance
Managing NymBoxes for Identity and Tracking Protection
Security Analysis of Accountable Anonymity in Dissent
A TorPath to TorCoin: Proof-of-Bandwidth Altcoins for Compensating Relays
From Onions to Shallots: Rewarding Tor Relays with TEARS
TAQ: Enhancing Fairness and Performance Predictability in Small Packet Regimes
A Wire-Compatible TCP Implementation for Low-Latency Applications
Crypto-Book: An Architecture for Privacy Preserving Online Identities
Structural Cloud Audits that Protect Private Information
Conscript Your Friends into Larger Anonymity Sets with JavaScript
Ensuring High-Quality Randomness in Cryptographic Key Generation
Hang With Your Buddies to Resist Intersection Attacks
An Untold Story of Redundant Clouds: Making Your Service Deployment Truly Reliable
Proactively Accountable Anonymous Messaging in Verdict
Maple: Simplifying SDN Programming Using Algorithmic Policies
Reducing Latency in Tor Circuits with Unordered Delivery
Lazy Tree Mapping: Generalizing and Scaling Deterministic Parallelism
Welcome to the World of Human Rights: Please Make Yourself Uncomfortable
GPUfs: Integrating a File System with GPUs
Enhancing the OS against Security Threats in System Administration
Dissent in Numbers: Making Strong Anonymity Scale
Deterministic OpenMP
Scavenging for Anonymity with BlogDrop
Scaling Software-Defined Network Controllers on Multicore Servers
Non-Linear Compression: Gzip Me Not!
Plugging Side-Channel Leaks with Timing Information Flow Control
Icebergs in the Clouds: the Other Risks of Cloud Computing
Strong Theft-Proof Privacy-Preserving Biometric Authentication
Fitting Square Pegs Through Round Pipes: Unordered Delivery Wire-Compatible with TCP and TLS
Faceless: Decentralized Anonymous Group Messaging for Online Social Networks
Scalable Anonymous Group Communication in the Anytrust Model
A Virtual Memory Foundation for Scalable Deterministic Parallelism
CertiKOS: A Certified Kernel for Secure Cloud Computing
Eyo: Device-Transparent Personal Storage
Deterministic OpenMP for Race-Free Parallelism
Workspace Consistency: A Programming Model for Shared Memory Parallelism
A Dynamic Recursive Unified Internet Design (DRUID)
Minion: an all-terrain packet packhorse to jump-start stalled internet transports
Determinating Timing Channels in Compute Clouds
Efficient System-Enforced Deterministic Parallelism
Dissent: Accountable Anonymous Group Messaging
Advanced Development of Certified OS Kernels
Unintended Consequences of NAT Deployments with Overlapping Address Space
Efficient Cross-Layer Negotiation
Device Transparency: a New Model for Mobile Storage
NAT Behavioral Requirements for ICMP
Breaking Up the Transport Logjam
NAT Behavioral Requirements for TCP
UIA: A Global Connectivity Architecture for Mobile Personal Devices
UIA: A Global Connectivity Architecture for Mobile Personal Devices
Vx32: Lightweight User-level Sandboxing on the x86
An Offline Foundation for Online Accountable Pseudonyms
State of Peer-to-Peer (P2P) Communication across Network Address Translators (NATs)
Directions in Internet Transport Evolution
Alpaca: Extensible Authorization for Distributed Services
Structured Streams: a New Transport Abstraction
Persistent Personal Names for Globally Connected Mobile Devices
Sybil Parties: An Offline Foundation for Online Accountability
User-Relative Names for Globally Connected Personal Devices
VXA: A Virtual Architecture for Durable Compressed Archives
Peer-to-Peer Communication Across Network Address Translators
Application Design Guidelines for Traversal through Network Address Translators
Operating Principles and General Behavioral Requirements for Network Address Translators (BEH-GEN)
Individual Representation
Wiki Democracy
Cache Directory Tagging Specification
Parsing Expression Grammars: A Recognition-Based Syntactic Foundation
Unmanaged Internet Protocol: Taming the Edge Network Management Crisis
Scalable Internet Routing on Topology-Independent Node Identities
Fx86: Functional Management of Imperative Virtual Machines
Service Duality - Vitalizing the Commons
Delegative Voting
Packrat Parsing: Simple, Powerful, Lazy, Linear Time
Packrat Parsing: a Practical Linear-Time Algorithm with Backtracking
Packrat Parsing: a Practical Linear-Time Algorithm with Backtracking
Delegative Democracy
Interface and Execution Models in the Fluke Kernel
The Flux OSKit: A Substrate for Kernel and Language Research
Flick: A Flexible, Optimizing IDL Compiler
The Flux OS Toolkit: Reusable Components for OS Implementation
CPU Inheritance Scheduling
Microkernels Meet Recursive Virtual Machines
User-level Checkpointing Through Exportable Kernel State
The Persistent Relevance of the Local Operating System to Global Applications
Using Annotated Interface Definitions to Optimize RPC
Separating Presentation from Interface in RPC and IDLs
Evolving Mach 3.0 to A Migrating Thread Model
Microkernels Should Support Passive Objects
FLEX: A Tool for Building Efficient and Flexible Systems
In-Kernel Servers on Mach 3.0: Implementation and Performance
Notes on Thread Models in Mach 3.0
Die Datenpresse
Object-Oriented Display Refreshing
Introduction: Promise, Failures, and Future of Self-Organizing Technologies
A Layered Architecture Perspective on Self-Organizing Technologies
Identity, Personhood, and Citizenship in the Digital Age
Economic Empowerment and Inclusion: Money and Wealth in Digital Democracy
Speech and Association: Privacy, Accountability, and Freedoms in Digital Communications
Filtering, Curating, and Rewarding Value and Expertise in the Digital Information Deluge
A Liquid Perspective on Social Choice for Digital Democracy
Aachen
Antelope Island
Avignon
Bar Harbor, Maine
Barcelona
Berlin
Binary Encoded Schematic Objects (BESO)
Bonn
Bryan's Family
Bryan's Home in Cambridge
Cologne
Composable Markup (CMark)
Composable Math Markup (CMath)
Composable Text Markup Language (CTML)
Composable Text Syntax
Decentralized Update Governance (DUG)
Delimited Text and Binary Syntax
Distributed randomness, drand, and the League of Entropy
Dresden
Efficient Stream Embedding with Composable Binary Encoding (CBE)
Escaping Escaping Hell with Matchertext Resource Identifiers
eXtensible Syntax Object Notation (XSON)
Flowers in Lausanne
Geneva
JSON Binary Schema
Lagoon
Lake Louise
Magnitudes: When an Integer is Too Precise
Marseille
MaxML: Matchertext-friendly XML Syntax
Midsummer's Eve at Zebediah's
My Cats
Opus '99
Paris
Peterhof
Piano
Rethinking Social Media to Escape the Echo Chamber
Rome
Rwanda
Saint Petersburg
Secure, Scalable Proof-of-Stake Blockchains
South Korea
Spring 2002
Stata Center
Tornado
Travels
Trip to Hawaii, October 1999
Utah Travels
Venice
Vermont
Vienna
Villars, Switzerland
VIPcode: Encoding and Decoding Structured Data with Verifiable Interface Presentations (VIPs)
XTAX: an Extensible Sytntax Metalanguage