Jonathan Poritz's Shared Materials Page

Shortcuts to sections below: [Please note: the full article texts on this page are posted merely as a convenience for the reader (and author!). In many cases, I do not own the copyright, and even when I do, I remind visitors that there are laws regarding the use (and Fair Use [see this wonderful article produced by the the EFF if you're unsure]) of copyrighted materials. Please read, quote, print out, and generally use in any way these materials only in a manner consistent with relevent laws and general scholarly good taste. In particular, when you wish to reprint large portions of any of these articles, I believe you are obligated to ask permission of the copyright owner. I would certainly appreciate it if you mention to me when you quote and/or link to even short excerpts, whether or not it is an article of which I remain the copyright owner. Thank you!]


  1. Academic Governance on the Virtual Shop Floor
  2. The Tenured IT Expert? Technology experts should have the academic freedom to speak on behalf of what's best for education, not just a university's bottom line.
  3. Open Access to Technology: Shared Governance of the Academy's Virtual Worlds
  4. Universal Gates in Other Universes
  5. Sharing the Power Over, and the Responsibility for, Information Technology Decisions in Academia
  6. Information Technology Wants to Be Free
  7. On entropy-preserving stochastic averages
  8. Who searches the searchers? community privacy in the age of monolithic search engines
  9. Intrusion-Tolerant Middleware: The Road to Automatic Security
  10. Trust[ed| in] computing, signed code, and the heat death of the Internet
  11. Hash woes
  12. Secure intrusion-tolerant replication on the Internet
  13. Social preferences and price cap regulation
  14. Around polygons in $\RR^3$ and $S^3$
  15. The moduli space of boundary compactifications of $SL(2,\RR)$
  16. Boundary compactifications of $SL(2,\RR)$ and $SL(2,\CC)$
  17. Ford and Dirichlet domains for cyclic subgroups of $PSL(2,\CC)$ acting on $H^3_\RR$ and $\partial H^3_\RR$
  18. Parabolic vector bundles and Hermitian-Yang-Mills connections over a Riemann surface


  1. Lies, Damned Lies, or Statistics:  How to Tell the Truth with Statistics
  2. Education is Not an App: The future of university teaching in the Internet age
  3. Yet Another Introductory Number Theory Textbook  (Cryptology Emphasis Version)
    [Please note: what follows is information about the first version of this book. A more current version is in the process of being written, the PDF of which can be found
    here, and whose source files will be posted probably in August of 2015; come back then if you want the recent version in a form you can modify yourself.]

Talks (those which have been saved in some form that can be shared):

  1. Digital Security HOWTO: Protect your Data, Communications, and Activities, & Painlessly Integrate Teaching Simple Security Into Classes
  2. Technology and the Future of Higher Equation: The 'Net as Neoliberal Dystopia [Yes, that should have been "Higher Education", but this misprint in the conference program was amusing to a mathematician.]
  3. Encrypt Your Email and Hard Drive: A Practical and Mathematical Introduction to Protecting Your Data from Criminals and Surveillance
  4. Information Technology Wants to Be Free the Colorado State University—Pueblo on 25 September 2014.

IBM Research Reports and European Union project deliverables:

  1. Property attestation--scalable and privacy-friendly security assessment of peer computers
  2. Alternative computational devices and architectures
    • With Giovanni Cherubini, Heike Riel and Gian Salis
    • Published 2003
    • Unfortunately, this is an IBM Confidential research report.
  3. Full Design of Dependable Third Party Services
  4. First specification of APIs and protocols for the MAFTIA middleware
  5. Specification of dependable trusted third parties

Articles in Progress:

  1. Finding geometry in classical number theory: the Chinese Remainder Theorem, Kronecker's Theorem and wrapping lines around tori
    • Under construction
  2. Perelman proves Poincaré
  3. Hash chains: a weak link in trusted computing
  4. Who?ogle: an associative interface to the web which preserves individual and community privacy
    • In preparation, watch this space.
  5. Hem-lines, web rankings and other correlates of the stock market
    • In preparation, watch this space.
  6. Ergodic theory and cryptography
    • In preparation, watch this space.


  1. Method and device for verifying the security of a computing platform
  2. Attestation of computing platforms
  3. Method and system to authenticate an application in a computing platform operating in Trusted Computing Group (TCG) domain

NOTE: Despite extensive research, it remains unclear to me who owns the copyright on MAFTIA deliverables — perhaps it is some branch of the EU? — and the MAFTIA web site does not clearly answer this question. In cases where this could be a concern, I suggest contancting one of the senior (former) MAFTIA organizers or perhaps the EU Information Society and Media Directorate-General (see this web site).

Jonathan Poritz (
Last modified:
Creative Commons License Everything on Jonathan Poritz's web pages is by Jonathan A. Poritz and is licensed under a
Creative Commons Attribution-ShareAlike 4.0 International License unless otherwise specified.