Downloads: 109 | Views: 307
Research Paper | Information Technology | India | Volume 4 Issue 9, September 2015 | Popularity: 6.1 / 10
Remote Voting System Using Extended Visual Cryptography
Tridib Chakraborty, Mizan Md Chowdhury
Abstract: Establishing trust is one of the most important human-human and human-computer interactions. Authentication can be done using something we know (for example, a password), something we have (for example, a mechanical key), or something we are (a living, breathing human). These may be combined to provide stronger authentication. In this paper, we discuss some of the issues associated with Internet-based remote voting and argue that visual cryptography offers a promising way to provide both satisfactory authentication and secret ballot guarantees.
Keywords: Remote voting, Extended Visual Cryptography, Authentication
Edition: Volume 4 Issue 9, September 2015
Pages: 1458 - 1459
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Informative Article, Information Technology, India, Volume 12 Issue 12, December 2023
Pages: 2114 - 2119Zero Knowledge Proof Techniques in PAM Authentication
Sri Kanth Mandru
Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Information Technology, India, Volume 9 Issue 4, April 2020
Pages: 1850 - 1857Securing Remote Work Environments in Telecom: Implementing Robust Cybersecurity Strategies to Secure Remote Workforce Environments in Telecom, Focusing on Data Protection and Secure Access Mechanisms
Jeevan Manda
Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Information Technology, United States of America, Volume 11 Issue 8, August 2022
Pages: 1549 - 1559Cybersecurity in Microservices Architectures: Protecting Distributed Retail Applications in Cloud Environments
Yash Jani, Arth Jani, Dhaval Gogri
Downloads: 2 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2
Research Paper, Information Technology, United States of America, Volume 11 Issue 3, March 2022
Pages: 1634 - 1641Adversarial Machine Learning: Attacks and Defense Mechanisms with Respect to AI Security
Rajashekhar Reddy Kethireddy
Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Information Technology, United States of America, Volume 8 Issue 4, April 2019
Pages: 2033 - 2037Handling Concurrent Transactions in Retail Systems Using Multi-Threading in Application Development
Rajesh Kotha