All Stories

  1. How to measure usable security: Natural strategies in voting protocols