Explores censorship resistance in privacy technologies, techniques to avoid Internet censorship, preventing communication, and censorship resistance systems like Tor.
Explores the security and verifiability of digital voting systems, including in-person and remote e-voting, focusing on protection against tampering and ballot counting efficiency.