IMPRESSIVE SMART CARD BASED ELECTRONIC VOTING SYSTEM
نویسندگان
چکیده
منابع مشابه
Smart Card based Robust Security System
In the up to date electronic planet, authentication of an individual is a vital assignment in numerous territories of everyday existence. Smart Cards are secure compact space gadgets utilized for a few requisitions specifically security identified ones including access to framework's database either connected or disconnected from the net. Smartcard are regularly “secure” movable units. It is an...
متن کاملA Smart Card-Based Mental Poker System
On-line casinos have experienced a great expansion since the generalized use of Internet started. There exist in the literature several proposals of systems allowing secure remote gaming. Nevertheless, the security requirements of some game families lead to the use of complex and costly cryptographic protocols. A particularly challenging game family is mental poker. In this paper we present a s...
متن کاملAssessment of Threats for Smart Card Based Electronic Cash
The security of smart card based electronic cash have been receiving significant attention recently. However, there has been little systematic analysis or quantification of the impact of the security break on the smart card based electronic cash economy. This paper discusses the assessment of threats in two phases using two different methodologies. The first is the assessment of overall threat ...
متن کاملSmart-Card Based Electronic Commerce: Characteristics and Roles
Based largely on its potential as an electronic cash substitute for low-value transactions, the market for smart-cards has been predicted to be US$9 billion by the year 2000. The numerous international pilot implementations of smart-card systems appear to support this prediction. Compared with the number of pilots, however, there has been remarkably few full scale rollouts of a broad-based prod...
متن کاملDouble voter perceptible blind signature based electronic voting protocol
Mu et al. have proposed an electronic voting protocol and claimed that it protects anonymity of voters, detects double voting and authenticates eligible voters. It has been shown that it does not protect voter's privacy and prevent double voting. After that, several schemes have been presented to fulfill these properties. However, many of them suffer from the same weaknesses. In this p...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Research in Engineering and Technology
سال: 2015
ISSN: 2321-7308,2319-1163
DOI: 10.15623/ijret.2015.0403048