Visual Cryptography for E-Voting by Using Fingerprint Technique
Democracy and elections have more than 2,500 years of tradition. Technology has always influenced the form of elections and the complexity of ways. Performing a good security analysis in the design of the system is a necessary step in order to ensure a reasonable level of protection. In this paper,...
| Main Author: | |
|---|---|
| Format: | Thesis |
| Language: | English English |
| Published: |
2010
|
| Subjects: | |
| Online Access: | https://etd.uum.edu.my/2345/1/Hadi_Ratham_Ghayab.pdf https://etd.uum.edu.my/2345/2/1.Hadi_Ratham_Ghayab.pdf https://etd.uum.edu.my/2345/ http://lintas.uum.edu.my:8080/elmu/index.jsp?module=webopac-l&action=fullDisplayRetriever.jsp&szMaterialNo=0000764901 |
| Abstract | Abstract here |
| _version_ | 1855353093297799168 |
|---|---|
| author | Ghayab, Hadi Ratham |
| author_facet | Ghayab, Hadi Ratham |
| author_sort | Ghayab, Hadi Ratham |
| description | Democracy and elections have more than 2,500 years of tradition. Technology has always influenced the form of elections and the complexity of ways. Performing a good security analysis in the design of the system is a necessary step in order to ensure a reasonable level of
protection. In this paper, we decided to use the fingerprint on the electronic voting system to increase the speed and accuracy in the proceedings of the electoral process, with the construction of a high-protection
system based on fingerprint voters to give most reliable
results, and tries to automation of the electoral system in Iraq, and gains the advantage of an e-voting system. |
| format | Thesis |
| id | oai:etd.uum.edu.my:2345 |
| institution | Universiti Utara Malaysia |
| language | English English |
| publishDate | 2010 |
| record_format | EPrints |
| record_pdf | Abstract |
| spelling | oai:etd.uum.edu.my:23452013-07-24T12:15:33Z https://etd.uum.edu.my/2345/ Visual Cryptography for E-Voting by Using Fingerprint Technique Ghayab, Hadi Ratham QA76 Computer software Democracy and elections have more than 2,500 years of tradition. Technology has always influenced the form of elections and the complexity of ways. Performing a good security analysis in the design of the system is a necessary step in order to ensure a reasonable level of protection. In this paper, we decided to use the fingerprint on the electronic voting system to increase the speed and accuracy in the proceedings of the electoral process, with the construction of a high-protection system based on fingerprint voters to give most reliable results, and tries to automation of the electoral system in Iraq, and gains the advantage of an e-voting system. 2010-09 Thesis NonPeerReviewed application/pdf en https://etd.uum.edu.my/2345/1/Hadi_Ratham_Ghayab.pdf application/pdf en https://etd.uum.edu.my/2345/2/1.Hadi_Ratham_Ghayab.pdf Ghayab, Hadi Ratham (2010) Visual Cryptography for E-Voting by Using Fingerprint Technique. Masters thesis, Universiti Utara Malaysia. http://lintas.uum.edu.my:8080/elmu/index.jsp?module=webopac-l&action=fullDisplayRetriever.jsp&szMaterialNo=0000764901 |
| spellingShingle | QA76 Computer software Ghayab, Hadi Ratham Visual Cryptography for E-Voting by Using Fingerprint Technique |
| thesis_level | Master |
| title | Visual Cryptography for E-Voting by Using Fingerprint Technique |
| title_full | Visual Cryptography for E-Voting by Using Fingerprint Technique |
| title_fullStr | Visual Cryptography for E-Voting by Using Fingerprint Technique |
| title_full_unstemmed | Visual Cryptography for E-Voting by Using Fingerprint Technique |
| title_short | Visual Cryptography for E-Voting by Using Fingerprint Technique |
| title_sort | visual cryptography for e voting by using fingerprint technique |
| topic | QA76 Computer software |
| url | https://etd.uum.edu.my/2345/1/Hadi_Ratham_Ghayab.pdf https://etd.uum.edu.my/2345/2/1.Hadi_Ratham_Ghayab.pdf https://etd.uum.edu.my/2345/ http://lintas.uum.edu.my:8080/elmu/index.jsp?module=webopac-l&action=fullDisplayRetriever.jsp&szMaterialNo=0000764901 |
| work_keys_str_mv | AT ghayabhadiratham visualcryptographyforevotingbyusingfingerprinttechnique |