International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 109 | Views: 307

Research Paper | Information Technology | India | Volume 4 Issue 9, September 2015 | Popularity: 6.1 / 10


     

Remote Voting System Using Extended Visual Cryptography

Tridib Chakraborty, Mizan Md Chowdhury


Abstract: Establishing trust is one of the most important human-human and human-computer interactions. Authentication can be done using something we know (for example, a password), something we have (for example, a mechanical key), or something we are (a living, breathing human). These may be combined to provide stronger authentication. In this paper, we discuss some of the issues associated with Internet-based remote voting and argue that visual cryptography offers a promising way to provide both satisfactory authentication and secret ballot guarantees.


Keywords: Remote voting, Extended Visual Cryptography, Authentication


Edition: Volume 4 Issue 9, September 2015


Pages: 1458 - 1459



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Tridib Chakraborty, Mizan Md Chowdhury, "Remote Voting System Using Extended Visual Cryptography", International Journal of Science and Research (IJSR), Volume 4 Issue 9, September 2015, pp. 1458-1459, https://www.ijsr.net/getabstract.php?paperid=SUB158341, DOI: https://www.doi.org/10.21275/SUB158341



Similar Articles

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Informative Article, Information Technology, India, Volume 12 Issue 12, December 2023

Pages: 2114 - 2119

Zero Knowledge Proof Techniques in PAM Authentication

Sri Kanth Mandru

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Information Technology, India, Volume 9 Issue 4, April 2020

Pages: 1850 - 1857

Securing Remote Work Environments in Telecom: Implementing Robust Cybersecurity Strategies to Secure Remote Workforce Environments in Telecom, Focusing on Data Protection and Secure Access Mechanisms

Jeevan Manda

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Information Technology, United States of America, Volume 11 Issue 8, August 2022

Pages: 1549 - 1559

Cybersecurity in Microservices Architectures: Protecting Distributed Retail Applications in Cloud Environments

Yash Jani, Arth Jani, Dhaval Gogri

Share this Article

Downloads: 2 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2

Research Paper, Information Technology, United States of America, Volume 11 Issue 3, March 2022

Pages: 1634 - 1641

Adversarial Machine Learning: Attacks and Defense Mechanisms with Respect to AI Security

Rajashekhar Reddy Kethireddy

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Information Technology, United States of America, Volume 8 Issue 4, April 2019

Pages: 2033 - 2037

Handling Concurrent Transactions in Retail Systems Using Multi-Threading in Application Development

Rajesh Kotha

Share this Article
Top