Receipt-Free Multi-Authority Voting with (2,2) Secret Sharing Based Authentication
Journal Title: International journal of Emerging Trends in Science and Technology - Year 2015, Vol 2, Issue 2
Abstract
Election and voting are the important activities in the democratic countries. The traditional voting system becomes inconvenient for the people who cannot visit the polling booth for the vote casting. To overcome the drawback of traditional voting system web based voting systems are introduced. Security is an important issue in the web based voting system. The proposed system provides secured authentication through the visual secret sharing scheme
Authors and Affiliations
Ms. Ashwini Walake
Network Security and Cryptography
Network Security & Cryptography is a complicated and Historically only tackled by Well-trained and experienced experts. However as more and more people become “wired”, an increasing number of people need to understand th...
Design and Implementation of a Modular Multilevel Inverter with FACTS Capability for Wind and PV systems
In this paper, a new three-phase inverter with flexible AC transmission system (FACTS) capability is presented. The proposed inverter is placed between the PV cell and the grid, same as a regular inverter, and is able to...
Effect of Fuel Injection Pressures on Performance Characteristics and Emission Analysis of D.I Diesel Engine Running on Honne Oil and Diesel Fuel Blend
In future demand for fossil fuels and environmental effects, a number of renewable sources of energy has been studied in worldwide. An attempt is made to apt of vegetable oil for diesel engine operation, without any chan...
Synthesis and characterization of polyamideimides from diaminobenzophenone-3,3′ ,4,4′ -tetracarboxylic diimides and aromatic dicarboxylic acid— terephthalic acid (TPA)
Four polyamideimides have been synthesized by direct polycondensation of imide containing diamines with dicarboxylic acid- terephthalic (TPA). The diimide-diamines were synthesized from benzophenone-3,3′ ,4,4′ - tetracar...
Improved Technique by Integrating AHP-TOPSIS for Prioritization
Requirements prioritization is used to minimize risk during development of the software project, so that the most important requirements are implemented first. There are many prioritization techniques are available to pr...