Visual Cryptography for E-Voting by Using Fingerprint Technique
Democracy and elections have more than 2,500 years of tradition. Technology has always influenced the form of elections and the complexity of ways. Performing a good security analysis in the design of the system is a necessary step in order to ensure a reasonable level of protection. In this paper,...
Saved in:
Main Author: | Ghayab, Hadi Ratham |
---|---|
Format: | Thesis |
Language: | eng eng |
Published: |
2010
|
Subjects: | |
Online Access: | https://etd.uum.edu.my/2345/1/Hadi_Ratham_Ghayab.pdf https://etd.uum.edu.my/2345/2/1.Hadi_Ratham_Ghayab.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Implementation of hashed cryptography algorithm based on cryptography message syntax
by: Ali, Mohammed Ahnaf
Published: (2019) -
Electronic Voting
by: Haziemeh, Feras Ahmad
Published: (2008) -
Binary vote assignment on grid quorum replication technique with association rule
by: Ainul Azila, Che Fauzi
Published: (2018) -
The Implementation of Securing Plaintext File Using Cryptography Method in Web Based Environment
by: Hasnira, Md. Lazim
Published: (2004) -
Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM)
by: Shuwandy, Moceheb Lazam
Published: (2012)