Explores the security and verifiability of digital voting systems, including in-person and remote e-voting, focusing on protection against tampering and ballot counting efficiency.
Explores the definitions, history, and applications of conditional access in media security, covering user authentication techniques, smart cards, biometrics, and legal aspects.
Explores censorship resistance strategies, including mimicry, tunneling, and covert channels, to ensure internet accessibility in the face of censorship.
Examines anonymous communications using Tor to protect privacy and navigate internet censorship, discussing its history, functionality, and limitations.