Visual Cryptography for E-Voting by Using Fingerprint Technique
Democracy and elections have more than 2,500 years of tradition. Technology has always influenced the form of elections and the complexity of ways. Performing a good security analysis in the design of the system is a necessary step in order to ensure a reasonable level of protection. In this paper,...
| Main Author: | Ghayab, Hadi Ratham |
|---|---|
| Format: | Thesis |
| Language: | English English |
| Published: |
2010
|
| Subjects: | |
| Online Access: | https://etd.uum.edu.my/2345/1/Hadi_Ratham_Ghayab.pdf https://etd.uum.edu.my/2345/2/1.Hadi_Ratham_Ghayab.pdf https://etd.uum.edu.my/2345/ http://lintas.uum.edu.my:8080/elmu/index.jsp?module=webopac-l&action=fullDisplayRetriever.jsp&szMaterialNo=0000764901 |
| Abstract | Abstract here |
Similar Items
Electronic Voting
by: Haziemeh, Feras Ahmad
Published: (2008)
by: Haziemeh, Feras Ahmad
Published: (2008)
Implementation of hashed cryptography algorithm based on cryptography message syntax
by: Ali, Mohammed Ahnaf
Published: (2019)
by: Ali, Mohammed Ahnaf
Published: (2019)
Binary vote assignment on grid quorum replication technique with association rule
by: Ainul Azila, Che Fauzi
Published: (2018)
by: Ainul Azila, Che Fauzi
Published: (2018)
The Implementation of Securing Plaintext File Using Cryptography Method in Web Based Environment
by: Hasnira, Md. Lazim
Published: (2004)
by: Hasnira, Md. Lazim
Published: (2004)
Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM)
by: Shuwandy, Moceheb Lazam
Published: (2012)
by: Shuwandy, Moceheb Lazam
Published: (2012)
Visualizing Student Performances Using Data Mining Techniques.
by: Sri Banu, Munisamy
Published: (2007)
by: Sri Banu, Munisamy
Published: (2007)
Using Visualization as an Easy Way to Learn Programming Logic
by: Loo, Sze Phei
Published: (2009)
by: Loo, Sze Phei
Published: (2009)
Improving targeting feedback for users with low visibility using visual redundant feedback
by: Sim, Dennis Chee Chow
Published: (2005)
by: Sim, Dennis Chee Chow
Published: (2005)
Pseudo-random number generator (PRNG) combined with text based watermarking for cryptography application / Lew Chee Hon
by: Lew , Chee Hon
Published: (2017)
by: Lew , Chee Hon
Published: (2017)
Product Recommendation for E-Groceries Using Apriori Algorithm
by: Muziah, Muhammad
Published: (2004)
by: Muziah, Muhammad
Published: (2004)
A process model for designing performance dashboard using visualization techniques / Muhammad Nasim Bahar
by: Muhammad Nasim , Bahar
Published: (2020)
by: Muhammad Nasim , Bahar
Published: (2020)
Urban Planning: The Potential For Developers and Planners to Use Virtual Reality Techniques
by: Ganapreeta, Renunathan Naidu
Published: (2008)
by: Ganapreeta, Renunathan Naidu
Published: (2008)
Developing E-learning Web Based Using ADDIE Model In Engineering Department For ACM
by: Al-Sa'di, Ahmad Abdel Kareem Mohammad
Published: (2008)
by: Al-Sa'di, Ahmad Abdel Kareem Mohammad
Published: (2008)
i-choose u: Development of Decision Support System Using Skyline Technique (Preference Query Technique): The Case of Choosing Malaysian Higher Learning Institutions
by: Elhassan, Omer Ibrahim Elkhder
Published: (2011)
by: Elhassan, Omer Ibrahim Elkhder
Published: (2011)
Identifying Purchasing Patterns of Arab and Malaysian
Students Using Data Mining Technique
by: Abuhamdah, Anmar Fakhri Moh'd
Published: (2006)
by: Abuhamdah, Anmar Fakhri Moh'd
Published: (2006)
Modeling Primary School Student Academic Performance Using Data Mining Technique
by: Muhamad, Mat Yaacub
Published: (2011)
by: Muhamad, Mat Yaacub
Published: (2011)
Framework of informal specification validation with visual specification and human factor involvement to improve requirement specification quality
by: Fauziah, Zainuddin
Published: (2019)
by: Fauziah, Zainuddin
Published: (2019)
Retrieval of human facial images based on visual content and semantic description / Ahmed Abdu Ali Alattab
by: Alattab, Ahmed Abdu Ali
Published: (2013)
by: Alattab, Ahmed Abdu Ali
Published: (2013)
E-Resource Searcher (ERS) System
by: Chen, Liang
Published: (2010)
by: Chen, Liang
Published: (2010)
Generating UML class diagram from source codes using multi-threading technique
by: Abdullah, Saif Khalid
Published: (2015)
by: Abdullah, Saif Khalid
Published: (2015)
UUM ePSYCH Solutions System
by: Faridatul Nisa, Muhammad Salleh
Published: (2011)
by: Faridatul Nisa, Muhammad Salleh
Published: (2011)
Information Extraction From Malay Vehicle Advertisement Text Using Natural Language Processing Techniques.
by: Norfadila, Mahrom
Published: (2007)
by: Norfadila, Mahrom
Published: (2007)
A novel hybrid supervised artificial neural network (ANN) for data visualization and classification to the application of mental disorder diagnosis
by: Md. Sarwar, Zahan Tapan
Published: (2008)
by: Md. Sarwar, Zahan Tapan
Published: (2008)
An acceptance model for contributing factors of continuous intention to use E-learning systems in Oman higher education institutions
by: Tawafak, Ragad M
Published: (2020)
by: Tawafak, Ragad M
Published: (2020)
Requirement Model for UUM E-Alumni Club
by: Amarah, Burhan Daoud As'ad
Published: (2008)
by: Amarah, Burhan Daoud As'ad
Published: (2008)
Paperless Online Banking (e-Cheque Imaging)
by: Mustafa, Mahdi (N. F) B.
Published: (2008)
by: Mustafa, Mahdi (N. F) B.
Published: (2008)
Comparative analysis between FPA and COCOMO techniques for software cost estimation
by: Ali Moftah, Abu Baker
Published: (2014)
by: Ali Moftah, Abu Baker
Published: (2014)
Functionality of Web-Based E-Journal Publishing Environment
by: Ainnecia, Yoag
Published: (2004)
by: Ainnecia, Yoag
Published: (2004)
A hybrid technique using minimal spanning tree and analytic hierarchical process to improve functional requirements prioritization
by: Yaseen, Muhammad
Published: (2021)
by: Yaseen, Muhammad
Published: (2021)
Comparative study on correctness and time taken of test case generation using EFG and BXT techniques for GUI application
by: Nser Brka, Mostafa
Published: (2015)
by: Nser Brka, Mostafa
Published: (2015)
The Impact of Normalization Techniques on Performance Backpropagation Networks
by: Norlida, Hassan
Published: (2004)
by: Norlida, Hassan
Published: (2004)
Empirical Comparison of Techniques for Handling Missing Values
by: Tikla, Salleh Mansour Mohamed
Published: (2006)
by: Tikla, Salleh Mansour Mohamed
Published: (2006)
Spatial information-based multimodal integration technique
by: Lee, Bee Wah
Published: (2006)
by: Lee, Bee Wah
Published: (2006)
Developing Interactive Multimedia Application For E-Learning Japanese Language
by: Goh, Choon Inn
Published: (2001)
by: Goh, Choon Inn
Published: (2001)
eSIMS Web Based School Information Management System
by: Shahida, Ibrahim
Published: (2002)
by: Shahida, Ibrahim
Published: (2002)
Developing Mobile Application for the E-commerce for the UUM
Students Community
by: Almatarneh, Hammam Khaled Hussein
Published: (2009)
by: Almatarneh, Hammam Khaled Hussein
Published: (2009)
Expert System For Classifying Shariah Compliance E-Business Companies
by: Wardah Atirah, Maharudin
Published: (2008)
by: Wardah Atirah, Maharudin
Published: (2008)
Testing model using risk poker technique for scrum-based software development projects / Siti Noor Hasanah Ghazali
by: Siti Noor Hasanah , Ghazali
Published: (2017)
by: Siti Noor Hasanah , Ghazali
Published: (2017)
Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed
by: Aneesa Ali, Ali Saeed
Published: (2017)
by: Aneesa Ali, Ali Saeed
Published: (2017)
Politeknik Kota Bharu (PKB) E-Brochure : A VR Approach
by: Hasni, Mahmood
Published: (2002)
by: Hasni, Mahmood
Published: (2002)
Similar Items
-
Electronic Voting
by: Haziemeh, Feras Ahmad
Published: (2008) -
Implementation of hashed cryptography algorithm based on cryptography message syntax
by: Ali, Mohammed Ahnaf
Published: (2019) -
Binary vote assignment on grid quorum replication technique with association rule
by: Ainul Azila, Che Fauzi
Published: (2018) -
The Implementation of Securing Plaintext File Using Cryptography Method in Web Based Environment
by: Hasnira, Md. Lazim
Published: (2004) -
Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM)
by: Shuwandy, Moceheb Lazam
Published: (2012)
