Secure E-Voting With Blind Signature
With a rapid growth in computer networks, many people can access the network through the Internet and therefore an electronic voting can be a viable alternative for conducting an election. Electronic voting system must attempt to achieve at least the same level of security as ordinary elections. We...
| Main Authors: | Ibrahim, Subariah, Kamat, Maznah, Salleh, Mazleena, Abdul Aziz, Shah Rizan |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
2003
|
| Subjects: | |
| Online Access: | http://eprints.utm.my/3262/ http://eprints.utm.my/3262/1/IEEE02-EVS_full_paper_ver14Nov.pdf |
Similar Items
Electronic Voting System: Preliminary Study
by: Ibrahim, Subariah, et al.
Published: (2000)
by: Ibrahim, Subariah, et al.
Published: (2000)
Security guidelines of electronic academic assets
by: Ibrahim, Subariah, et al.
Published: (2002)
by: Ibrahim, Subariah, et al.
Published: (2002)
Blind signature / Musfirah Mohd Ali
by: Musfirah, Mohd Ali
Published: (2005)
by: Musfirah, Mohd Ali
Published: (2005)
Recommended guidelines of electronic academic assets
by: Ibrahim, Subariah, et al.
Published: (2002)
by: Ibrahim, Subariah, et al.
Published: (2002)
Linkability of some blind signature schemes
by: Heng, Swee-Huay, et al.
Published: (2007)
by: Heng, Swee-Huay, et al.
Published: (2007)
Image encryption algorithm based on chaotic mapping
by: Salleh, Mazleena, et al.
Published: (2003)
by: Salleh, Mazleena, et al.
Published: (2003)
Design and development of a secured electronic fingerprint voting system
by: Foo, Hong Zee
Published: (2021)
by: Foo, Hong Zee
Published: (2021)
Steganography : random LSB insertion using discrete logarithm
by: Mohamed Amin, Muhalim, et al.
Published: (2003)
by: Mohamed Amin, Muhalim, et al.
Published: (2003)
Security mediated certificateless signatures
by: Yap, Nvun-She, et al.
Published: (2007)
by: Yap, Nvun-She, et al.
Published: (2007)
University E-voting System Utilizing Blockchain Technology and Zero-Knowledge Proofs
by: Lim, Aun Xian
Published: (2022)
by: Lim, Aun Xian
Published: (2022)
Attacks on a Blind Signature-Based Steganographic Protocol of IEEE-WISP 2001
by: Ling, Huo-Chong, et al.
Published: (2007)
by: Ling, Huo-Chong, et al.
Published: (2007)
Validation of Vote Counting Supervision Based on Vote Tally at West Bangka District
by: Ekariva Annas, Asmara, et al.
Published: (2022)
by: Ekariva Annas, Asmara, et al.
Published: (2022)
An offline signature verification technique using pixels intensity levels
by: Shah, Abdul Salam, et al.
Published: (2016)
by: Shah, Abdul Salam, et al.
Published: (2016)
Adapting web images for blind people
by: Misman, Ahmad Fatzilah, et al.
Published: (2011)
by: Misman, Ahmad Fatzilah, et al.
Published: (2011)
Diffusion analysis of EFN-MDS structure
by: Ibrahim, Subariah
Published: (2006)
by: Ibrahim, Subariah
Published: (2006)
Provider independent cryptographic tools
by: Ibrahim, Subariah, et al.
Published: (2003)
by: Ibrahim, Subariah, et al.
Published: (2003)
The development of price-wise e-commerce enabled web site.
by: Salleh, Mazleena, et al.
Published: (2001)
by: Salleh, Mazleena, et al.
Published: (2001)
Fault Tolerance On Binary Vote Assignment Cloud Quorum (BVACQ) Replication Technique
by: Noraziah, Ahmad, et al.
Published: (2013)
by: Noraziah, Ahmad, et al.
Published: (2013)
Sink node mobility in covering monitoring area for data collection in WSNs
by: Kamat, Maznah, et al.
Published: (2007)
by: Kamat, Maznah, et al.
Published: (2007)
Stroke-to-stroke matching in on-line signature verification
by: Ahmad Jaini, Azhar
Published: (2010)
by: Ahmad Jaini, Azhar
Published: (2010)
Item recognition tools for blind people using RFID
by: Ahamat @ Ahmad, Nazman
Published: (2007)
by: Ahamat @ Ahmad, Nazman
Published: (2007)
Managing Fragmented Database Replication for Mygrants Using Binary Vote Assignment on Cloud Quorum
by: Noraziah, Ahmad, et al.
Published: (2014)
by: Noraziah, Ahmad, et al.
Published: (2014)
Binary Vote Assignment on Cloud Quorum Algorithm for Fragmented MyGRANTS Database Replication
by: Noraziah, Ahmad, et al.
Published: (2015)
by: Noraziah, Ahmad, et al.
Published: (2015)
Online signature verification based on dynamic feature discriminators
by: Omar, Nazaruddin
Published: (2009)
by: Omar, Nazaruddin
Published: (2009)
Feasibility study on using MCDM for e-voting
by: Rozlina, Mohamed, et al.
Published: (2022)
by: Rozlina, Mohamed, et al.
Published: (2022)
Tagging web images for blind users.
by: Misman, Ahmad Fatzilah, et al.
Published: (2011)
by: Misman, Ahmad Fatzilah, et al.
Published: (2011)
Bimodal person identification system based on speech and signature recognition's
by: Gunawan, Teddy Surya
Published: (2013)
by: Gunawan, Teddy Surya
Published: (2013)
Dynamic signature verification based on hybrid wavelet-Fourier transform
by: Khoh, W. H., et al.
Published: (2014)
by: Khoh, W. H., et al.
Published: (2014)
Protection of integrity and ownership of pdf documents using invisible signature
by: Taha, Imad, et al.
Published: (2012)
by: Taha, Imad, et al.
Published: (2012)
Smart Blind Stick With Emergency Button Using Internet Of Things (IoT)
by: Jamila Sahira, Junaiddi
Published: (2023)
by: Jamila Sahira, Junaiddi
Published: (2023)
A blind recovery technique with integer wavelet transforms in image watermarking
by: Ernawan, Ferda, et al.
Published: (2023)
by: Ernawan, Ferda, et al.
Published: (2023)
Comparison of TCP Variants Over Self-Similar Traffic
by: Salleh, Mazleena, et al.
Published: (2005)
by: Salleh, Mazleena, et al.
Published: (2005)
The sign tale of hurst parameter: a revisit
by: Salleh, Mazleena, et al.
Published: (2007)
by: Salleh, Mazleena, et al.
Published: (2007)
The sign tale of hurst parameter : a revisit
by: Salleh, Mazleena, et al.
Published: (2007)
by: Salleh, Mazleena, et al.
Published: (2007)
Performance of transmission control protocol on self-similar traffic.
by: Salleh, Mazleena, et al.
Published: (2005)
by: Salleh, Mazleena, et al.
Published: (2005)
Guideline for privacy and security in Cloud First Security Environment
by: Abdul Aziz, Normaziah, et al.
Published: (2017)
by: Abdul Aziz, Normaziah, et al.
Published: (2017)
Diffusion analysis of EFN-MDS structure
by: Ibrahim, Subariah, et al.
Published: (2006)
by: Ibrahim, Subariah, et al.
Published: (2006)
A Review on Biological Inspired Computation in Cryptology
by: Ibrahim, Subariah, et al.
Published: (2005)
by: Ibrahim, Subariah, et al.
Published: (2005)
Modified key size determination models for symmetric ciphers
by: Ibrahim, Subariah, et al.
Published: (2005)
by: Ibrahim, Subariah, et al.
Published: (2005)
Diffusion analysis af a scalable fiestel network
by: Ibrahim, Subariah, et al.
Published: (2005)
by: Ibrahim, Subariah, et al.
Published: (2005)
Similar Items
-
Electronic Voting System: Preliminary Study
by: Ibrahim, Subariah, et al.
Published: (2000) -
Security guidelines of electronic academic assets
by: Ibrahim, Subariah, et al.
Published: (2002) -
Blind signature / Musfirah Mohd Ali
by: Musfirah, Mohd Ali
Published: (2005) -
Recommended guidelines of electronic academic assets
by: Ibrahim, Subariah, et al.
Published: (2002) -
Linkability of some blind signature schemes
by: Heng, Swee-Huay, et al.
Published: (2007)