KawalPilpres2019: a highly secured real count voting escort architecture

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Building a secured XML real-time interactive data exchange architecture

Nowadays, TCP and UDP communication protocols are the most widely used transport methods for carrying out XML data messages between different services. XML data security is always a big concern especially when using internet cloud. Common XML encryption techniques encrypt part of private sections of the XML file as an entire block of text and apply these techniques directly on them. Man-in-the-...

متن کامل

Escort: A Path-Based OS Security Architecture

Escort is the security architecture for Scout, a configurable operating system designed for network appliances. Scout is unique in that it is designed around paths—a communication-centric abstraction that encapsulates information flows through the system—rather than the more traditional processes and servers. Scout uses paths to make end-to-end resource allocation decisions. Escort extends this...

متن کامل

Secured Electronic Voting Protocol Using Biometric Authentication

This paper proposes a new secure e-voting protocol. This new scheme does not require a special voting channel and communication can occur entirely over the existing Internet. This method integrates Internet convenience and cryptology. In the existing protocols either the tallier has to wait for the decryption key from voter till the voting process is over or the verification process has to wait...

متن کامل

Secured services in a multi-tier architecture

This paper presents an innovative approach which provides, independently of the business application, a set of high-level security features. This approach is based both on existing standards at the specification level and on a new technology named VSS (Virtual Security Server) at the implementation level. This technology has been prototyped through a set of Java APIs providing independence from...

متن کامل

Secured communications within a multi-processors architecture

The development of secured embedded systems is in full expansion. The more we need complex treatments, the more we need to think about the security inside a system and its several elements. We participate in an ANR project aiming to develop a USB token able to cipher or decipher ”on-the-fly” files stored on a computer. The USB token is based on a MPSoC and our work focus on the security of comm...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: TELKOMNIKA (Telecommunication Computing Electronics and Control)

سال: 2019

ISSN: 2302-9293,1693-6930

DOI: 10.12928/telkomnika.v17i6.13241