KawalPilpres2019: a highly secured real count voting escort architecture
نویسندگان
چکیده
منابع مشابه
Building a secured XML real-time interactive data exchange architecture
Nowadays, TCP and UDP communication protocols are the most widely used transport methods for carrying out XML data messages between different services. XML data security is always a big concern especially when using internet cloud. Common XML encryption techniques encrypt part of private sections of the XML file as an entire block of text and apply these techniques directly on them. Man-in-the-...
متن کاملEscort: A Path-Based OS Security Architecture
Escort is the security architecture for Scout, a configurable operating system designed for network appliances. Scout is unique in that it is designed around paths—a communication-centric abstraction that encapsulates information flows through the system—rather than the more traditional processes and servers. Scout uses paths to make end-to-end resource allocation decisions. Escort extends this...
متن کاملSecured Electronic Voting Protocol Using Biometric Authentication
This paper proposes a new secure e-voting protocol. This new scheme does not require a special voting channel and communication can occur entirely over the existing Internet. This method integrates Internet convenience and cryptology. In the existing protocols either the tallier has to wait for the decryption key from voter till the voting process is over or the verification process has to wait...
متن کاملSecured services in a multi-tier architecture
This paper presents an innovative approach which provides, independently of the business application, a set of high-level security features. This approach is based both on existing standards at the specification level and on a new technology named VSS (Virtual Security Server) at the implementation level. This technology has been prototyped through a set of Java APIs providing independence from...
متن کاملSecured communications within a multi-processors architecture
The development of secured embedded systems is in full expansion. The more we need complex treatments, the more we need to think about the security inside a system and its several elements. We participate in an ANR project aiming to develop a USB token able to cipher or decipher ”on-the-fly” files stored on a computer. The USB token is based on a MPSoC and our work focus on the security of comm...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: TELKOMNIKA (Telecommunication Computing Electronics and Control)
سال: 2019
ISSN: 2302-9293,1693-6930
DOI: 10.12928/telkomnika.v17i6.13241