A General E-Voting Scheme and Its Consequences
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 11
Abstract
This paper introduces on electronic voting scheme, that have security context or known as e-trusted voting scheme. In this study, the prototype builds based on secured and trusted framework for electronic voting In this paper a new electronic voting scheme is described which guarantees coercion- resistance as well as privacy, eligibility, unreusability and verifiability. . In order to test whether the system had been fully functioning and meets the user's requirement, we have to apply the system to a sample of 20 persons and finally the prototype occur the objective and give us a general prototype system that provides security and trusted electronic voting.
Authors and Affiliations
Ashish Jain, Dhanraj Negi, Dheeraj Dixit
Investigate the Features for Analysis of EEG Signals Using Multivariate Empirical Mode Decomposition
BCI (Brain Computer Interface) is collaboration between neural activity of the brain and an external device. These are the control and communication systems which converts human brain signals into commands and messages...
A Quick Review on Applications of Fuzzy Logic in Waste Water Treatment
Fuzzy controllers were used in all processing steps of wastewater treatment. It was also observed that the fuzzy controllers provide very good results in various operating conditions. Depends on the process sensitivity...
Arduino Based Ultrasonic Radar System using Matlab
Radio detection and ranging, that is, RADAR is a radio wave technique to determine the scope of the object, angle or speed. It is object detection technology. It is used to detect aircraft, ships, spacecraft, missiles,...
A Multiband MIMO Microstrip Patch Antenna for Wireless Applications
This letter presents the design of a compact size modified rectangular shaped microstrip line feed with DGS patch antenna is proposed here. DGS structure is used for improving the performance of microstrip patch antenna...
Secured Data Storage in Clouds Using Anonymous Authentication By Decentralized Access Control
In this paper, we propose the secure data keeping in clouds for another decentralized access. The cloud checks the legitimacy of the arrangement without knowing the client's character in the proposed plan. Our component...