Downloads: 109
Research Paper | Information Technology | India | Volume 4 Issue 9, September 2015
Remote Voting System Using Extended Visual Cryptography
Tridib Chakraborty | Mizan Md Chowdhury
Abstract: Establishing trust is one of the most important human-human and human-computer interactions. Authentication can be done using something we know (for example, a password), something we have (for example, a mechanical key), or something we are (a living, breathing human). These may be combined to provide stronger authentication. In this paper, we discuss some of the issues associated with Internet-based remote voting and argue that visual cryptography offers a promising way to provide both satisfactory authentication and secret ballot guarantees.
Keywords: Remote voting, Extended Visual Cryptography, Authentication
Edition: Volume 4 Issue 9, September 2015,
Pages: 1458 - 1459
Similar Articles with Keyword 'Authentication'
Downloads: 0
Analysis Study Research Paper, Information Technology, United States of America, Volume 13 Issue 2, February 2024
Pages: 494 - 500Evolving Trends in Open-Source RDBMS: Performance, Scalability and Security Insights
Naresh Kumar Miryala
Downloads: 5 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Information Technology, India, Volume 10 Issue 5, May 2021
Pages: 174 - 178Android Notes using Finger Print Authentication
Vaibhav Garg | Siddharth Yadav | Rishabh Kamal