A secure, anonymous and verifiable E-Voting system
This project is an online voting system that involve some network security which ensure a more secure, anonymous and verifiable E-Voting System. Readers will be able to gain some knowledges regarding the types of existing voting system and their vulnerabilities. The problem being emphasized in this...
| Main Author: | Ooi, Elynn |
|---|---|
| Format: | Final Year Project / Dissertation / Thesis |
| Published: |
2020
|
| Subjects: | |
| Online Access: | http://eprints.utar.edu.my/3792/ http://eprints.utar.edu.my/3792/1/15ACB02615_FYP.pdf |
Similar Items
Inhibitors of leishmania mexicana phosphoglycerate mutase identified by virtual screening and verified by inhibition studies
by: Ahmad Fuad, Fazia Adyani, et al.
Published: (2016)
by: Ahmad Fuad, Fazia Adyani, et al.
Published: (2016)
A conceptual anonymity model to ensure privacy for sensitive network data
by: Arafat, N.H.M., et al.
Published: (2021)
by: Arafat, N.H.M., et al.
Published: (2021)
Anonymous feedback in e-learning systems
by: Dreher, Heinz
Published: (2005)
by: Dreher, Heinz
Published: (2005)
Secure E-Voting With Blind Signature
by: Ibrahim, Subariah, et al.
Published: (2003)
by: Ibrahim, Subariah, et al.
Published: (2003)
Pilot study on investigation of Thermal Sensation Votes (TSV) and students' performance in naturally ventilated classroom
by: Nor Azli, Mohamad Nor Azhari, et al.
Published: (2022)
by: Nor Azli, Mohamad Nor Azhari, et al.
Published: (2022)
Design and development of a secured electronic fingerprint voting system
by: Foo, Hong Zee
Published: (2021)
by: Foo, Hong Zee
Published: (2021)
Community E-content management system
by: Ong, Andrew Tan Hui
Published: (2020)
by: Ong, Andrew Tan Hui
Published: (2020)
A tracable proactive anonymous electronic cash
by: Chang, Yu Cheng, et al.
Published: (2000)
by: Chang, Yu Cheng, et al.
Published: (2000)
E-Dengie Teleconsultation System
by: Maria Soosai, Beatrice Ann
Published: (2011)
by: Maria Soosai, Beatrice Ann
Published: (2011)
Motion detection for PC based security system by using optical flow
by: Nur Nabilah, Mohamad Hamid
Published: (2010)
by: Nur Nabilah, Mohamad Hamid
Published: (2010)
Implementation of Identity Based Encryption in e-Voting System
by: Selamat, S. R., et al.
Published: (2007)
by: Selamat, S. R., et al.
Published: (2007)
Efficient human motion detection with adaptive background for vision-based security system
by: Kamaru Zaman, Fadhlan Hafizhelmi, et al.
Published: (2017)
by: Kamaru Zaman, Fadhlan Hafizhelmi, et al.
Published: (2017)
Verifying systems of resource-bounded agents
by: Alechina, Natasha, et al.
Published: (2016)
by: Alechina, Natasha, et al.
Published: (2016)
Development of A Secured Database Access on Application Server
by: Ab Rashid, Siti Rosmaniza, et al.
Published: (2011)
by: Ab Rashid, Siti Rosmaniza, et al.
Published: (2011)
Database security system with multi entrances
by: Mohd Nurfajren, Mat Isa
Published: (2009)
by: Mohd Nurfajren, Mat Isa
Published: (2009)
A transparent and immutable voting system utilizing blockchain
by: Sam, Jian Him
Published: (2023)
by: Sam, Jian Him
Published: (2023)
The Barriers of Implementing E-Tendering System By Quantity Surveyors in Selangor
by: Chong, Won Jiun
Published: (2016)
by: Chong, Won Jiun
Published: (2016)
Secure topology for electronic medical record transmission
by: Alanazi, Hamdan O., et al.
Published: (2010)
by: Alanazi, Hamdan O., et al.
Published: (2010)
An e-voting application using cryptography technology
by: Chin, Hsin Tien
Published: (2020)
by: Chin, Hsin Tien
Published: (2020)
Security issues of wireless sensor networks in healthcare applications
by: Ng, H. S., et al.
Published: (2006)
by: Ng, H. S., et al.
Published: (2006)
Treatment of palm oil mill secondary effluent (POMSE) using fenton oxidation system
by: Ooi, Boon Siew
Published: (2006)
by: Ooi, Boon Siew
Published: (2006)
Assessing privacy and readiness of electronic voting system in Indonesia
by: Lubis, Muharman, et al.
Published: (2017)
by: Lubis, Muharman, et al.
Published: (2017)
A key distribution scheme for secure multicast over IPv6 wireless networks
by: Aye, Win Lye, et al.
Published: (2005)
by: Aye, Win Lye, et al.
Published: (2005)
S.M.A.R.T Home - Security Monitoring Automation Remote Technology Home
by: Lim, Hong Guan
Published: (2017)
by: Lim, Hong Guan
Published: (2017)
Verifying the authenticity of digital certificates
by: Kamel Ariffin, Muhammad Rezal
Published: (2021)
by: Kamel Ariffin, Muhammad Rezal
Published: (2021)
The worth of anonymous feedback
by: Dreher, Heinz, et al.
Published: (2006)
by: Dreher, Heinz, et al.
Published: (2006)
Key Management for Secure Multicast over IPv6 Wireless Networks
by: Aye, Win, et al.
Published: (2006)
by: Aye, Win, et al.
Published: (2006)
Anonymous: a social movement
by: Knight, William
Published: (2018)
by: Knight, William
Published: (2018)
Aiman, a graduate with disabilities, secures UMPSA Degree
by: Nor Salwana, Mohammad Idris
Published: (2023)
by: Nor Salwana, Mohammad Idris
Published: (2023)
Cryptanalysis of two anonymous buyer-seller watermarking protocols and an improvement for true anonymity
by: Goi, , BM, et al.
Published: (2004)
by: Goi, , BM, et al.
Published: (2004)
A risk assessment study on electronic voting system
by: Faisal Abdullah, Sakhar Al Amry
Published: (2016)
by: Faisal Abdullah, Sakhar Al Amry
Published: (2016)
Artificial Barrier As To Enhance Removal Of E.Coli In Riverbank Filtration
by: Rashid, Nur Aziemah Abd
Published: (2019)
by: Rashid, Nur Aziemah Abd
Published: (2019)
Shift work effect towards muscular endurance among security officers of higher education institution in east coast Malaysia
by: Muhammad Hafizul Hilmi, Ibrahim
Published: (2019)
by: Muhammad Hafizul Hilmi, Ibrahim
Published: (2019)
Analysis of IEEE 802.11b wireless security for university wireless LAN design
by: Chan,, FKL, et al.
Published: (2005)
by: Chan,, FKL, et al.
Published: (2005)
Online voting system (ovs) on server site
by: Mohammad Haeri, Jaiman
Published: (2013)
by: Mohammad Haeri, Jaiman
Published: (2013)
Increasing Data Anonymity using AES and Privacy Technique
by: Thamer Khalil, Esmeel, et al.
Published: (2019)
by: Thamer Khalil, Esmeel, et al.
Published: (2019)
EAK362E - MANAGEMENT INFORMATION SYSTEM. MARCH 2005
by: PPKAW, Pusat Pengajian Kejuruteraan Awam
Published: (2005)
by: PPKAW, Pusat Pengajian Kejuruteraan Awam
Published: (2005)
EAK362E - MANAGEMENT INFORMATION SYSTEMS. MARCH 2003
by: PPKAW, Pusat Pengajian Kejuruteraan Awam
Published: (2003)
by: PPKAW, Pusat Pengajian Kejuruteraan Awam
Published: (2003)
Determination Of Seismic Vulnerability Assessment By Using Rapid Screening Method Through Web-Based Application
by: Ooi, Jun Hao
Published: (2021)
by: Ooi, Jun Hao
Published: (2021)
Virtual-learning content management system : design and implementation using Joomla for eLearning and problem-based learning courses
by: ashikin, Norul, et al.
Published: (2012)
by: ashikin, Norul, et al.
Published: (2012)
Similar Items
-
Inhibitors of leishmania mexicana phosphoglycerate mutase identified by virtual screening and verified by inhibition studies
by: Ahmad Fuad, Fazia Adyani, et al.
Published: (2016) -
A conceptual anonymity model to ensure privacy for sensitive network data
by: Arafat, N.H.M., et al.
Published: (2021) -
Anonymous feedback in e-learning systems
by: Dreher, Heinz
Published: (2005) -
Secure E-Voting With Blind Signature
by: Ibrahim, Subariah, et al.
Published: (2003) -
Pilot study on investigation of Thermal Sensation Votes (TSV) and students' performance in naturally ventilated classroom
by: Nor Azli, Mohamad Nor Azhari, et al.
Published: (2022)