From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

On the Usability of HTTPS Deployment., , , , , и . CHI, стр. 310. ACM, (2019)Can Voters Detect Malicious Manipulation of Ballot Marking Devices?, , , , , , и . SP, стр. 679-694. IEEE, (2020)Decentralized Control: A Case Study of Russia., , , , , , , , и . NDSS, The Internet Society, (2020)Election Security Is Harder Than You Think.. University of Michigan, USA, (2020)UnclearBallot: Automated Ballot Image Manipulation., , , и . E-VOTE-ID, том 11759 из Lecture Notes in Computer Science, стр. 14-31. Springer, (2019)Implementing Attestable kiosks., , и . PST, стр. 722-729. IEEE, (2016)403 Forbidden: A Global View of CDN Geoblocking., , , , , , , и . Internet Measurement Conference, стр. 218-230. ACM, (2018)Bernoulli Ballot Polling: A Manifest Improvement for Risk-Limiting Audits., , , , и . Financial Cryptography Workshops, том 11599 из Lecture Notes in Computer Science, стр. 226-241. Springer, (2019)Towards a Complete View of the Certificate Ecosystem., , , , , и . Internet Measurement Conference, стр. 543-549. ACM, (2016)Public Evidence from Secret Ballots., , , , , , , , и . E-VOTE-ID, том 10615 из Lecture Notes in Computer Science, стр. 84-109. Springer, (2017)