Visual Cryptography for E-Voting by Using Fingerprint Technique
Democracy and elections have more than 2,500 years of tradition. Technology has always influenced the form of elections and the complexity of ways. Performing a good security analysis in the design of the system is a necessary step in order to ensure a reasonable level of protection. In this paper,...
| Auteur principal: | Ghayab, Hadi Ratham |
|---|---|
| Format: | Dissertation |
| Langue: | anglais anglais |
| Publié: |
2010
|
| Sujets: | |
| Accès en ligne: | https://etd.uum.edu.my/2345/1/Hadi_Ratham_Ghayab.pdf https://etd.uum.edu.my/2345/2/1.Hadi_Ratham_Ghayab.pdf https://etd.uum.edu.my/2345/ http://lintas.uum.edu.my:8080/elmu/index.jsp?module=webopac-l&action=fullDisplayRetriever.jsp&szMaterialNo=0000764901 |
| Abstract | Abstract here |
Documents similaires
Electronic Voting
par: Haziemeh, Feras Ahmad
Publié: (2008)
par: Haziemeh, Feras Ahmad
Publié: (2008)
Implementation of hashed cryptography algorithm based on cryptography message syntax
par: Ali, Mohammed Ahnaf
Publié: (2019)
par: Ali, Mohammed Ahnaf
Publié: (2019)
Binary vote assignment on grid quorum replication technique with association rule
par: Ainul Azila, Che Fauzi
Publié: (2018)
par: Ainul Azila, Che Fauzi
Publié: (2018)
The Implementation of Securing Plaintext File Using Cryptography Method in Web Based Environment
par: Hasnira, Md. Lazim
Publié: (2004)
par: Hasnira, Md. Lazim
Publié: (2004)
Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM)
par: Shuwandy, Moceheb Lazam
Publié: (2012)
par: Shuwandy, Moceheb Lazam
Publié: (2012)
Visualizing Student Performances Using Data Mining Techniques.
par: Sri Banu, Munisamy
Publié: (2007)
par: Sri Banu, Munisamy
Publié: (2007)
Using Visualization as an Easy Way to Learn Programming Logic
par: Loo, Sze Phei
Publié: (2009)
par: Loo, Sze Phei
Publié: (2009)
Improving targeting feedback for users with low visibility using visual redundant feedback
par: Sim, Dennis Chee Chow
Publié: (2005)
par: Sim, Dennis Chee Chow
Publié: (2005)
Pseudo-random number generator (PRNG) combined with text based watermarking for cryptography application / Lew Chee Hon
par: Lew , Chee Hon
Publié: (2017)
par: Lew , Chee Hon
Publié: (2017)
Product Recommendation for E-Groceries Using Apriori Algorithm
par: Muziah, Muhammad
Publié: (2004)
par: Muziah, Muhammad
Publié: (2004)
A process model for designing performance dashboard using visualization techniques / Muhammad Nasim Bahar
par: Muhammad Nasim , Bahar
Publié: (2020)
par: Muhammad Nasim , Bahar
Publié: (2020)
Developing E-learning Web Based Using ADDIE Model In Engineering Department For ACM
par: Al-Sa'di, Ahmad Abdel Kareem Mohammad
Publié: (2008)
par: Al-Sa'di, Ahmad Abdel Kareem Mohammad
Publié: (2008)
Urban Planning: The Potential For Developers and Planners to Use Virtual Reality Techniques
par: Ganapreeta, Renunathan Naidu
Publié: (2008)
par: Ganapreeta, Renunathan Naidu
Publié: (2008)
Framework of informal specification validation with visual specification and human factor involvement to improve requirement specification quality
par: Fauziah, Zainuddin
Publié: (2019)
par: Fauziah, Zainuddin
Publié: (2019)
Retrieval of human facial images based on visual content and semantic description / Ahmed Abdu Ali Alattab
par: Alattab, Ahmed Abdu Ali
Publié: (2013)
par: Alattab, Ahmed Abdu Ali
Publié: (2013)
E-Resource Searcher (ERS) System
par: Chen, Liang
Publié: (2010)
par: Chen, Liang
Publié: (2010)
UUM ePSYCH Solutions System
par: Faridatul Nisa, Muhammad Salleh
Publié: (2011)
par: Faridatul Nisa, Muhammad Salleh
Publié: (2011)
i-choose u: Development of Decision Support System Using Skyline Technique (Preference Query Technique): The Case of Choosing Malaysian Higher Learning Institutions
par: Elhassan, Omer Ibrahim Elkhder
Publié: (2011)
par: Elhassan, Omer Ibrahim Elkhder
Publié: (2011)
Modeling Primary School Student Academic Performance Using Data Mining Technique
par: Muhamad, Mat Yaacub
Publié: (2011)
par: Muhamad, Mat Yaacub
Publié: (2011)
Identifying Purchasing Patterns of Arab and Malaysian
Students Using Data Mining Technique
par: Abuhamdah, Anmar Fakhri Moh'd
Publié: (2006)
par: Abuhamdah, Anmar Fakhri Moh'd
Publié: (2006)
Paperless Online Banking (e-Cheque Imaging)
par: Mustafa, Mahdi (N. F) B.
Publié: (2008)
par: Mustafa, Mahdi (N. F) B.
Publié: (2008)
Requirement Model for UUM E-Alumni Club
par: Amarah, Burhan Daoud As'ad
Publié: (2008)
par: Amarah, Burhan Daoud As'ad
Publié: (2008)
Generating UML class diagram from source codes using multi-threading technique
par: Abdullah, Saif Khalid
Publié: (2015)
par: Abdullah, Saif Khalid
Publié: (2015)
A novel hybrid supervised artificial neural network (ANN) for data visualization and classification to the application of mental disorder diagnosis
par: Md. Sarwar, Zahan Tapan
Publié: (2008)
par: Md. Sarwar, Zahan Tapan
Publié: (2008)
An acceptance model for contributing factors of continuous intention to use E-learning systems in Oman higher education institutions
par: Tawafak, Ragad M
Publié: (2020)
par: Tawafak, Ragad M
Publié: (2020)
Information Extraction From Malay Vehicle Advertisement Text Using Natural Language Processing Techniques.
par: Norfadila, Mahrom
Publié: (2007)
par: Norfadila, Mahrom
Publié: (2007)
Functionality of Web-Based E-Journal Publishing Environment
par: Ainnecia, Yoag
Publié: (2004)
par: Ainnecia, Yoag
Publié: (2004)
Comparative analysis between FPA and COCOMO techniques for software cost estimation
par: Ali Moftah, Abu Baker
Publié: (2014)
par: Ali Moftah, Abu Baker
Publié: (2014)
Developing Mobile Application for the E-commerce for the UUM
Students Community
par: Almatarneh, Hammam Khaled Hussein
Publié: (2009)
par: Almatarneh, Hammam Khaled Hussein
Publié: (2009)
eSIMS Web Based School Information Management System
par: Shahida, Ibrahim
Publié: (2002)
par: Shahida, Ibrahim
Publié: (2002)
Developing Interactive Multimedia Application For E-Learning Japanese Language
par: Goh, Choon Inn
Publié: (2001)
par: Goh, Choon Inn
Publié: (2001)
Expert System For Classifying Shariah Compliance E-Business Companies
par: Wardah Atirah, Maharudin
Publié: (2008)
par: Wardah Atirah, Maharudin
Publié: (2008)
A hybrid technique using minimal spanning tree and analytic hierarchical process to improve functional requirements prioritization
par: Yaseen, Muhammad
Publié: (2021)
par: Yaseen, Muhammad
Publié: (2021)
Comparative study on correctness and time taken of test case generation using EFG and BXT techniques for GUI application
par: Nser Brka, Mostafa
Publié: (2015)
par: Nser Brka, Mostafa
Publié: (2015)
Spatial information-based multimodal integration technique
par: Lee, Bee Wah
Publié: (2006)
par: Lee, Bee Wah
Publié: (2006)
Empirical Comparison of Techniques for Handling Missing Values
par: Tikla, Salleh Mansour Mohamed
Publié: (2006)
par: Tikla, Salleh Mansour Mohamed
Publié: (2006)
The Impact of Normalization Techniques on Performance Backpropagation Networks
par: Norlida, Hassan
Publié: (2004)
par: Norlida, Hassan
Publié: (2004)
Politeknik Kota Bharu (PKB) E-Brochure : A VR Approach
par: Hasni, Mahmood
Publié: (2002)
par: Hasni, Mahmood
Publié: (2002)
Testing model using risk poker technique for scrum-based software development projects / Siti Noor Hasanah Ghazali
par: Siti Noor Hasanah , Ghazali
Publié: (2017)
par: Siti Noor Hasanah , Ghazali
Publié: (2017)
Data Mining Classification Techniques and Performances on Medical Data
par: Benyehmad, Yahyia Mohammed M. Ali
Publié: (2006)
par: Benyehmad, Yahyia Mohammed M. Ali
Publié: (2006)
Documents similaires
-
Electronic Voting
par: Haziemeh, Feras Ahmad
Publié: (2008) -
Implementation of hashed cryptography algorithm based on cryptography message syntax
par: Ali, Mohammed Ahnaf
Publié: (2019) -
Binary vote assignment on grid quorum replication technique with association rule
par: Ainul Azila, Che Fauzi
Publié: (2018) -
The Implementation of Securing Plaintext File Using Cryptography Method in Web Based Environment
par: Hasnira, Md. Lazim
Publié: (2004) -
Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM)
par: Shuwandy, Moceheb Lazam
Publié: (2012)
