Iris recognition for E-Voting authentication in UiTM Melaka Campus Jasin / Muhamad Akmal Othman
E-Voting system is used in UiTM Melaka to ease and save the time for voting process among students. However, UiTM Melaka still using the conventional authentication process for e-voting system. This authentication process is insufficient due to the paper checklist can easily damage and difficult to...
| Main Author: | Othman, Muhamad Akmal |
|---|---|
| Format: | Student Project |
| Language: | English |
| Published: |
Faculty of Computer and Mathematical Sciences
2017
|
| Subjects: | |
| Online Access: | https://ir.uitm.edu.my/id/eprint/21366/ |
Similar Items
Smart biosecurity door locking system / Nur Nadia Syahirah ‘Asri
by: ‘Asri, Nur Nadia Syahirah
Published: (2017)
by: ‘Asri, Nur Nadia Syahirah
Published: (2017)
An improved binary method for scalar multiplication in elliptic curve cryptography
by: Mohamed, Mohamad Afendee, et al.
Published: (2010)
by: Mohamed, Mohamad Afendee, et al.
Published: (2010)
Cryptanalysis of El-Gamal AAs cryptosystem
by: Mandangan, Arif
Published: (2011)
by: Mandangan, Arif
Published: (2011)
Modified algorithm for image watermarking using 2D-DCT and elgamal cryptosystem / Nur Azien Yazid, Kamilah Abdullah and Suhaila Abd Halim
by: Yazid, Nur Azien, et al.
Published: (2019)
by: Yazid, Nur Azien, et al.
Published: (2019)
Secure block cipher inspired by the human immune system
by: Ariffin, Suriyani
Published: (2012)
by: Ariffin, Suriyani
Published: (2012)
Steganography in webpages using CSS color attributes enhanced by rule-based system
by: Nehzati, Seyedeh Sheida
Published: (2016)
by: Nehzati, Seyedeh Sheida
Published: (2016)
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
by: Ismail, Haqi Khalid
Published: (2021)
by: Ismail, Haqi Khalid
Published: (2021)
Grid-based multi-touch gesture to enhance two-factor authentication graphical password for mobile phones
by: Zabidi, Nur Syabila
Published: (2021)
by: Zabidi, Nur Syabila
Published: (2021)
Nonlinearity analyses and adaptation of nonlinearity traits of key generation protocol of el-gamal AAß cryptosystem
by: Ahmad, Miza Mumtaz
Published: (2011)
by: Ahmad, Miza Mumtaz
Published: (2011)
Performance analysis and improvement of rabin primitive based cryptosystems
by: Mahad, Zahari
Published: (2014)
by: Mahad, Zahari
Published: (2014)
Leave recommender mobile application for supporting staff of UiTM Malacca Campus Jasin / Maizeaitul Nasira Mohamad Haris
by: Mohamad Haris, Maizeaitul Nasira
Published: (2015)
by: Mohamad Haris, Maizeaitul Nasira
Published: (2015)
Security performance analysis of photography service system / Farah Shazwani Ismail
by: Ismail, Farah Shazwani
Published: (2019)
by: Ismail, Farah Shazwani
Published: (2019)
Kembangan pseudotnaf untuk pendaraban skalar di atas lenkuk koblitz
by: Yunos, Faridah
Published: (2014)
by: Yunos, Faridah
Published: (2014)
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
by: Mohamed Yassin, Warusia
Published: (2015)
by: Mohamed Yassin, Warusia
Published: (2015)
Enhancing speed performance of the cryptographic algorithm based on the lucas sequence
by: M. Abulkhirat, Esam
Published: (2003)
by: M. Abulkhirat, Esam
Published: (2003)
Zero distortion-based steganography for handwritten signature
by: Iranmanesh, Vahab
Published: (2018)
by: Iranmanesh, Vahab
Published: (2018)
New compendium of RSA vulnerabilities
by: Abd Ghafar, Amir Hamzah
Published: (2020)
by: Abd Ghafar, Amir Hamzah
Published: (2020)
Improved security of Rijndael key expansion function
by: Hussien, Al-Abadi Hassan Mansur
Published: (2017)
by: Hussien, Al-Abadi Hassan Mansur
Published: (2017)
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
by: Syed Adnan, Syed Farid
Published: (2019)
by: Syed Adnan, Syed Farid
Published: (2019)
Iris authentication using privatized advanced correlation filter
by: Chong, , SC, et al.
Published: (2006)
by: Chong, , SC, et al.
Published: (2006)
Cryptanalysis of polynomial reconstruction problem based cryptosystems
by: Yusof, Siti Nabilah
Published: (2023)
by: Yusof, Siti Nabilah
Published: (2023)
Counselling appointment booking through telegram bot for UiTM Jasin / Sharifah Amirah Zulaikha Syed Ahmad Kamal
by: Syed Ahmad Kamal, Sharifah Amirah Zulaikha
Published: (2018)
by: Syed Ahmad Kamal, Sharifah Amirah Zulaikha
Published: (2018)
Character property method with biometric multifactor authentication for arabic text steganography
by: Roslan, Nuur Alifah
Published: (2018)
by: Roslan, Nuur Alifah
Published: (2018)
Iris Segmentation
by: Anis Farihan, Mat Raffei, et al.
Published: (2018)
by: Anis Farihan, Mat Raffei, et al.
Published: (2018)
Ehancing security and privacy in local area network with TORVPN using : raspberry pi as access point / Mohamad AfiqHakimi Rosli
by: Rosli, Mohamad AfiqHakimi
Published: (2019)
by: Rosli, Mohamad AfiqHakimi
Published: (2019)
A prototype of domestic internet filtering tools / Netty Akmal Borhan
by: Borhan, Netty Akmal
Published: (2006)
by: Borhan, Netty Akmal
Published: (2006)
A systematic mapping on risks and techniques to enhance security in multi-cloud environments
by: Gonzalez Alberto, Ana Y
Published: (2017)
by: Gonzalez Alberto, Ana Y
Published: (2017)
Iris segmentation and normalization approach
by: Shamsi, Mahboubeh, et al.
Published: (2008)
by: Shamsi, Mahboubeh, et al.
Published: (2008)
SafeSearch – Microcomputer based VPN / Mohamad Ridzuan Mohd Alias
by: Mohd Alias, Mohamad Ridzuan
Published: (2020)
by: Mohd Alias, Mohamad Ridzuan
Published: (2020)
Herba online / Zen Akmal Dol Bakri
by: Zen Akmal, Dol Bakri
Published: (2001)
by: Zen Akmal, Dol Bakri
Published: (2001)
New directions in forging multivariate signature schemes
by: Abdul Jamal, Nurul Amiera Sakinah
Published: (2023)
by: Abdul Jamal, Nurul Amiera Sakinah
Published: (2023)
Mobile application on real-time highway traffic status in Malaysia / Akmal Irham Asnor
by: Asnor, Akmal Irham
Published: (2019)
by: Asnor, Akmal Irham
Published: (2019)
NFC payment printing system for library UiTM Jasin (UiTM Jasin Library : PrintingKJM) / Faraheen Mohd Fadzillullah
by: Mohd Fadzillullah, Faraheenh
Published: (2018)
by: Mohd Fadzillullah, Faraheenh
Published: (2018)
Improved Algebraic Cryptanalysis of the Reduced-Round Advanced Encryption Standard
by: Rezaeipour, Davood
Published: (2011)
by: Rezaeipour, Davood
Published: (2011)
Secured single stage multiphoton approach for quantum cryptography protocol in free space optic
by: Harun, Nur Ziadah
Published: (2019)
by: Harun, Nur Ziadah
Published: (2019)
Factors that influence internet banking adoption among UiTM Melaka City Campus undergraduates / Nabila Emira Abdul Hamid
by: Abdul Hamid, Nabila Emira
Published: (2015)
by: Abdul Hamid, Nabila Emira
Published: (2015)
Validation of Vote Counting Supervision Based on Vote Tally at West Bangka District
by: Ekariva Annas, Asmara, et al.
Published: (2022)
by: Ekariva Annas, Asmara, et al.
Published: (2022)
Exam invigilation scheduling system for UiTM Malacca Jasin Campus / Maizatul Akmam Mustapa
by: Mustapa, Maizatul Akmam
Published: (2015)
by: Mustapa, Maizatul Akmam
Published: (2015)
Electronic Voting System: Preliminary Study
by: Ibrahim, Subariah, et al.
Published: (2000)
by: Ibrahim, Subariah, et al.
Published: (2000)
Secure E-Voting With Blind Signature
by: Ibrahim, Subariah, et al.
Published: (2003)
by: Ibrahim, Subariah, et al.
Published: (2003)
Similar Items
-
Smart biosecurity door locking system / Nur Nadia Syahirah ‘Asri
by: ‘Asri, Nur Nadia Syahirah
Published: (2017) -
An improved binary method for scalar multiplication in elliptic curve cryptography
by: Mohamed, Mohamad Afendee, et al.
Published: (2010) -
Cryptanalysis of El-Gamal AAs cryptosystem
by: Mandangan, Arif
Published: (2011) -
Modified algorithm for image watermarking using 2D-DCT and elgamal cryptosystem / Nur Azien Yazid, Kamilah Abdullah and Suhaila Abd Halim
by: Yazid, Nur Azien, et al.
Published: (2019) -
Secure block cipher inspired by the human immune system
by: Ariffin, Suriyani
Published: (2012)