Secured Electronic Voting Protocol Using Biometric Authentication
نویسندگان
چکیده
منابع مشابه
Secured Electronic Voting Protocol Using Biometric Authentication
This paper proposes a new secure e-voting protocol. This new scheme does not require a special voting channel and communication can occur entirely over the existing Internet. This method integrates Internet convenience and cryptology. In the existing protocols either the tallier has to wait for the decryption key from voter till the voting process is over or the verification process has to wait...
متن کاملSecured Authentication Protocol System Using Images
In order to protect secret information from sensitive and various applications, secured authentication system should be incorporated; it should contain security and confidentiality. Even if it is assumed that the cryptographic primitives are perfect, the security goals may not be achieved: the system itself may have weaknesses that can be exploited by an attacker in network attacks. In this pap...
متن کاملMultimodal Biometric - based Secured Authentication System using Steganography
Problem statement: The main challenge in the design of a security system for high security mobile ad OC network is how to prevent the attacks against data modification and authentication. Approach: In this novel proposed system the messages communicated between the users are encrypted by the cancellable cryptographic key generated from fingerprint features of the receiver by applying genetic op...
متن کاملSecured Biometric Authentication using Visual Cryptography and Transforms
Protection of biometric data is gaining importance because its uniqueness and digital watermarking techniques are used to protect the biometric data from either accidental or intentional attacks. Here introduces a novel secured authentication method using wavelet decomposition and Visual Cryptography to hide an iris image. In this report gives exhaustive study on a scheme in which iris image is...
متن کاملSecuring Electronic Medical Records Using Biometric Authentication
Ensuring the security of medical records is becoming an increasingly important problem as modern technology is integrated into existing medical services. As a consequence of the adoption of electronic medical records in the health care sector, it is becoming more and more common for a health professional to edit and view a patient’s record using a tablet PC. In order to protect the patient’s pr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Advances in Internet of Things
سال: 2011
ISSN: 2161-6817,2161-6825
DOI: 10.4236/ait.2011.12006