An e-voting application using cryptography technology
The project is mainly a web application for the purpose of online voting. This online voting system is mainly to provide an online platform for voters and candidates to vote through the Internet or sign up to participate in voting projects. In addition, the voting network system also allows managers...
| Main Author: | Chin, Hsin Tien |
|---|---|
| Format: | Final Year Project / Dissertation / Thesis |
| Published: |
2020
|
| Subjects: | |
| Online Access: | http://eprints.utar.edu.my/3945/ http://eprints.utar.edu.my/3945/1/18ACB05766_FYP.pdf |
Similar Items
Implementation of Identity Based Encryption in e-Voting System
by: Selamat, S. R., et al.
Published: (2007)
by: Selamat, S. R., et al.
Published: (2007)
Large Integer Arithmetic in GPU for Cryptography
by: Lee, Wen Dick
Published: (2017)
by: Lee, Wen Dick
Published: (2017)
Code-Based Signature Schemes For Online Voting System Based On The Blockchain Technology
by: Lee, Feng Wei
Published: (2022)
by: Lee, Feng Wei
Published: (2022)
New approach of cryptography algorithm for e- mail applications
by: Khmag, Asem, et al.
Published: (2005)
by: Khmag, Asem, et al.
Published: (2005)
Public key cryptography in resource-constrained WSN
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
University E-voting System Utilizing Blockchain Technology and Zero-Knowledge Proofs
by: Lim, Aun Xian
Published: (2022)
by: Lim, Aun Xian
Published: (2022)
Secure E-Voting With Blind Signature
by: Ibrahim, Subariah, et al.
Published: (2003)
by: Ibrahim, Subariah, et al.
Published: (2003)
RISC32-E cryptography performance evaluation
by: Teo, Sei Hau
Published: (2022)
by: Teo, Sei Hau
Published: (2022)
A new cryptographic algorithm based on decomposition problem in elliptic curve cryptography / Hilyati Hanina Zazali
by: Hilyati Hanina, Zazali
Published: (2012)
by: Hilyati Hanina, Zazali
Published: (2012)
Feasibility study on using MCDM for e-voting
by: Rozlina, Mohamed, et al.
Published: (2022)
by: Rozlina, Mohamed, et al.
Published: (2022)
Communications cryptography
by: Khalifa, Othman Omran, et al.
Published: (2004)
by: Khalifa, Othman Omran, et al.
Published: (2004)
Quantum cryptography
by: Messikh, Azeddin
Published: (2011)
by: Messikh, Azeddin
Published: (2011)
Method for use in quantum cryptography
by: Sellami , Ali, et al.
Published: (2010)
by: Sellami , Ali, et al.
Published: (2010)
Basics of security and cryptography
by: Pathan, Al-Sakib Khan
Published: (2014)
by: Pathan, Al-Sakib Khan
Published: (2014)
Chaos Based Cryptography An Alternative to Algebraic Cryptography
by: Kamel Ariffin, Muhammad Rezal
Published: (2008)
by: Kamel Ariffin, Muhammad Rezal
Published: (2008)
Cryptography as a Service (CaaS): Quantum cryptography for secure cloud computing
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017)
Machine based cryptography
by: Makarin, Rusydi Hasan, et al.
Published: (2011)
by: Makarin, Rusydi Hasan, et al.
Published: (2011)
A secure, anonymous and verifiable E-Voting system
by: Ooi, Elynn
Published: (2020)
by: Ooi, Elynn
Published: (2020)
Use of Cryptography in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2013)
by: Jaber, Aws Naser, et al.
Published: (2013)
Finite and infinite field cryptography analysis and applications
by: Mohammed G. Al-Saidi, Nadia, et al.
Published: (2012)
by: Mohammed G. Al-Saidi, Nadia, et al.
Published: (2012)
Implementation of hashed cryptography algorithm based on cryptography message syntax
by: Ali, Mohammed Ahnaf
Published: (2019)
by: Ali, Mohammed Ahnaf
Published: (2019)
Practical cryptography: algorithms and implementations using C++
Published: (2014)
Published: (2014)
Quantum Cryptography Experiment using Optical Devices
by: Azahari, Nur Shahirah, et al.
Published: (2023)
by: Azahari, Nur Shahirah, et al.
Published: (2023)
Quantum Cryptography Experiment using Optical Devices
by: Azahar, Nur Shahirah, et al.
Published: (2023)
by: Azahar, Nur Shahirah, et al.
Published: (2023)
Quantum Cryptography Experiment using Optical Devices
by: Azahari, Nur Shahirah, et al.
Published: (2023)
by: Azahari, Nur Shahirah, et al.
Published: (2023)
Quantum Cryptography Experiment using Opticalb Devices
by: Azahari, Nur Shahirah, et al.
Published: (2023)
by: Azahari, Nur Shahirah, et al.
Published: (2023)
Quantum Cryptography Experiment using Optical Devices
by: Azahari, Nur Shahirah, et al.
Published: (2023)
by: Azahari, Nur Shahirah, et al.
Published: (2023)
Cryptography: past, present and future
Published: (2011)
Published: (2011)
A preliminary study on in-vitro lung cancer detection using e-nose technology
by: Thriumani , Reena, et al.
Published: (2014)
by: Thriumani , Reena, et al.
Published: (2014)
New Representation Method For Integers And Its Application On Elliptic Curve Cryptography
by: Eghdamian, Arash
Published: (2020)
by: Eghdamian, Arash
Published: (2020)
Theory of quantum cryptography
by: Ali, Sellami, et al.
Published: (2011)
by: Ali, Sellami, et al.
Published: (2011)
Implementing cryptography in database
by: Kwan, Shong Hann
Published: (2010)
by: Kwan, Shong Hann
Published: (2010)
Scalar multiplication via elliptic nets with application to cryptography
by: Muslim, Norliana, et al.
Published: (2018)
by: Muslim, Norliana, et al.
Published: (2018)
Modeling the influence of information technology (IT) adoption factors on the electronic voting (E-Voting) technology using partial least squares-structural equation model (PLS-SEM) methods
by: Salimonu, I.R., et al.
Published: (2014)
by: Salimonu, I.R., et al.
Published: (2014)
Chaotification Methods For
Enhancing One-Dimension Digital
Chaotic Maps For Applications In
Cryptography
by: Alawida, Moatsum Khalif Oduh
Published: (2020)
by: Alawida, Moatsum Khalif Oduh
Published: (2020)
Chaotification Methods For
Enhancing One-Dimension Digital
Chaotic Maps For Applications In
Cryptography
by: Alawida, Moatsum Khalif Oduh
Published: (2022)
by: Alawida, Moatsum Khalif Oduh
Published: (2022)
Coding, cryptography, information security and OFDM
Published: (2011)
Published: (2011)
UMP students vote representatives this week
by: Nor Salwana, Mohammad Idris
Published: (2021)
by: Nor Salwana, Mohammad Idris
Published: (2021)
Validation of Vote Counting Supervision Based on Vote Tally at West Bangka District
by: Ekariva Annas, Asmara, et al.
Published: (2022)
by: Ekariva Annas, Asmara, et al.
Published: (2022)
Quantum Cryptography Experiment using Optical Devices
by: Azahari, Nur Shahirah, et al.
Published: (2023)
by: Azahari, Nur Shahirah, et al.
Published: (2023)
Similar Items
-
Implementation of Identity Based Encryption in e-Voting System
by: Selamat, S. R., et al.
Published: (2007) -
Large Integer Arithmetic in GPU for Cryptography
by: Lee, Wen Dick
Published: (2017) -
Code-Based Signature Schemes For Online Voting System Based On The Blockchain Technology
by: Lee, Feng Wei
Published: (2022) -
New approach of cryptography algorithm for e- mail applications
by: Khmag, Asem, et al.
Published: (2005) -
Public key cryptography in resource-constrained WSN
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)