Remote Voting System Using Extended Visual Cryptography
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Downloads: 108

Research Paper | Information Technology | India | Volume 4 Issue 9, September 2015

Remote Voting System Using Extended Visual Cryptography

Tridib Chakraborty, Mizan Md Chowdhury

Establishing trust is one of the most important human-human and human-computer interactions. Authentication can be done using something we know (for example, a password), something we have (for example, a mechanical key), or something we are (a living, breathing human). These may be combined to provide stronger authentication. In this paper, we discuss some of the issues associated with Internet-based remote voting and argue that visual cryptography offers a promising way to provide both satisfactory authentication and secret ballot guarantees.

Keywords: Remote voting, Extended Visual Cryptography, Authentication

Edition: Volume 4 Issue 9, September 2015

Pages: 1458 - 1459

Share this Article

How to Cite this Article?

Tridib Chakraborty, Mizan Md Chowdhury, "Remote Voting System Using Extended Visual Cryptography", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB158341, Volume 4 Issue 9, September 2015, 1458 - 1459

Enter Your Email Address




Similar Articles with Keyword 'Extended Visual Cryptography'

Downloads: 108

Research Paper, Information Technology, India, Volume 4 Issue 9, September 2015

Pages: 1458 - 1459

Remote Voting System Using Extended Visual Cryptography

Tridib Chakraborty, Mizan Md Chowdhury

Share this Article

Downloads: 130

Survey Paper, Information Technology, India, Volume 4 Issue 1, January 2015

Pages: 703 - 705

Survey on Visual Cryptography Schemes

Prajakta Nikam, Dr. Kishor Kinage

Share this Article

Similar Articles with Keyword 'Authentication'

Downloads: 1

Research Paper, Information Technology, India, Volume 10 Issue 5, May 2021

Pages: 174 - 178

Android Notes using Finger Print Authentication

Vaibhav Garg, Siddharth Yadav, Rishabh Kamal

Share this Article

Downloads: 104

Survey Paper, Information Technology, India, Volume 3 Issue 4, April 2014

Pages: 747 - 750

A Survey on Shoulder Surfing Resistant Text Based Graphical Password Schemes

Mokal P. H., Devikar R. N.

Share this Article

Downloads: 105

Survey Paper, Information Technology, India, Volume 4 Issue 2, February 2015

Pages: 1307 - 1311

A Survey on Authentication Techniques and User Recognition

Vyanktesh Dorlikar, Anjali Chandavale

Share this Article

Downloads: 105

Research Paper, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 1892 - 1895

Securing Data in Cloud Using Homomorphic Encryption

Honey Patel, Jasmin Jha

Share this Article

Downloads: 106

Survey Paper, Information Technology, India, Volume 5 Issue 4, April 2016

Pages: 1865 - 1867

Survey on Cloud Computing Security Algorithms

Akash Kanthale, S. P. Potdar

Share this Article



Top