Research

Reset
Title
Author(s)
Year
Edward Felten
2015
We present CONIKS, an end-user key verification service capable of integration in end-to-end encrypted communication systems. CONIKS builds on transparency log proposals for web server certificates but solves several new challenges specific to key ...
Edward Felten
2015
We study the ability of a passive eavesdropper to leverage “third-party” HTTP tracking cookies for mass surveillance. If two web pages embed the same tracker which tags the browser with a unique cookie, then the adversary can link visits to those pages ...
Edward Felten
2015
More generally, the privacy implications of A/B experiments on users have not received much attention in the policy literature. This essay  explains the distinctive privacy implications of A/B experiments, explores some hypotheticals, and applies the ...
Edward Felten
2014
We propose Mixcoin, a protocol to facilitate anonymous payments in Bitcoin and similar cryptocurrencies. We build on the emergent phenomenon of currency mixes, adding an accountability mechanism to expose theft. We demonstrate that incentives of mixes and ...
Susan Fiske
2014
Facebook’s experimental manipulation of newsfeed content and the subsequent PNAS publication of significant findings from it (1) have drawn attention to the regulation of human participation in academic research and to the differences between commercial ...
Janet Currie
2013
Discussions of “big data” in medicine often revolve around gene sequencing and biosamples. It is perhaps less recognized that administrative data in the form of vital records, hospital discharge abstracts, insurance claims, and other routinely collected ...