102,290 research outputs found

    Implementation of Identity Based Encryption in e-Voting System

    Get PDF
    This paper explains about the design and implementation of Identity Based Encryption (IBE) in web-based Voting application. IBE is a completely new approach to the problem of encryption which was found on the traditional Public Key Infrastructure. It can be used on any arbitrary string as a public key, enabling data to be protected without the need for certificates and reduction of infrastructure cost due to certificates database maintenance. Protection implemented in this application is a key server that controls the mapping of identities to decryption keys where the key is only one-time pad implementation. By using the IBE technique, authentication and security can be preserved in the web-based Voting application where it provides integrity, authenticity, anonymity and confidentiality in this application

    The design of voting and rating services within Web4Groups

    Get PDF
    The Web4Groups EU supported project is one of the Telematics Application Development Projects of the Fourth Framework Program. The target of the project is to develop a distributed World Wide Web based, non-simultaneous group communication system that can also be considered as a complete redefinition of the traditional communication services like Usenet. The paper provides with a global overview on Web4Groups system and particularly the concepts followed during the design of Voting and Rating services within Web4Groups

    RANCANG BANGUN APLIKASI E-VOTE PEMILIHAN KETUA RT PADA PERUMAHAN DUTA ASRI PALEM 7 BERBASIS WEB

    Get PDF
    This web-based E-Voting was created to facilitate the election of the RT Chair at Duta Asri Palem 7 Housing. The problem currently being faced is that in the ongoing elections, many residents cannot attend, there are still multiple elections and the vote count is still manual. The purpose of making this e-voting is to make it easier for residents to choose the Chair of the RT anywhere so that the expected vote results are more leverage. The research methods used in making this e-voting are field studies, literature studies and interviews. And the design method used by the researcher is the SDLC (System Development Life Cycle) method which is the whole process of building a system through several steps such as Planning, Analysis, Design and Implementation. The e-voting application is built with the PHP programming language, and utilizes the MySQL database as a database server. The expected result of making e-voting is that the problems that have occurred so far can be minimized and can streamline time and improve performance in carrying out the election of RT Chair in Housing Ambassador Asri Palm 7

    Wireless Voting System Based on IEEE 802.15.4/Zigbee

    Get PDF
    PrĂĄce podrobně popisuje bezdrĂĄtovĂœ protokol IEEE 802.15.4/ZigBee a zabĂœvĂĄ se nĂĄvrhem architektury bezdrĂĄtovĂ©ho hlasovacĂ­ho systĂ©mu zaloĆŸenĂ© na zmĂ­něnĂ© technologii. Jako součást nĂĄvrhu je popsĂĄno vyuĆŸitĂ­ vĂœvojovĂ©ho kitu Freescale 1321xNSK k hlasovĂĄnĂ­. Stejně tak schĂ©ma ƙízenĂ­ hlasovĂĄnĂ­ pomocĂ­ aplikačnĂ­ho serveru, metoda zĂĄlohovĂĄnĂ­ dat a export vĂœsledkĆŻ hlasovĂĄnĂ­ na webovĂ© rozhrannĂ­ včetně jejich zobrazenĂ­. HlavnĂ­m cĂ­lem prĂĄce je realizace navrĆŸenĂ©ho systĂ©mu. V zĂĄvěru prĂĄce je uvedena analĂœza vlastnostĂ­ implementovanĂ©ho systĂ©mu a shrnutĂ­ dosaĆŸenĂœch vĂœsledkĆŻ.In the work, a detail description of the wireless IEEE 802.15.4/ZigBee protocol is presented along with the architectural design of the wireless voting system based on the mentioned technology. The voting system proposed in the work is based on the Freescale's 1321xNSK development kit. The problems related to the design and implementation of the system by means of the kit as well as the problems related to the record-management scheme using the application server, the data backup method and web-export functions including the views are described in the work. At the end of the work, the proposed system is analyzed from several points of view and its main characteristics are summarized.

    Online Voting System based on Image Steganography and Visual Cryptography

    Get PDF
    This paper discusses the implementation of an onlinevoting system based on image steganography and visualcryptography. The system was implemented inJava EE on a web-based interface, with MySQL databaseserver and Glassfish application server as thebackend. After considering the requirements of an onlinevoting system, current technologies on electronicvoting schemes in published literature were examined.Next, the cryptographic and steganography techniquesbest suited for the requirements of the voting systemwere chosen, and the software was implemented. Wehave incorporated in our system techniques like thepassword hashed based scheme, visual cryptography,F5 image steganography and threshold decryptioncryptosystem. The analysis, design and implementationphase of the software development of the votingsystem is discussed in detail. We have also used aquestionnaire survey and did the user acceptance testingof the system

    Implementasi Metode Caesar Cipher dalam Penerapan Sistem E-Voting Berbasis Web pada Pemilihan Abang None Jakarta

    Get PDF
    In this increasingly modern era, technology has become a must in improving performance in every organization and various other activities. One example of the application of technology that will be explained in this research is the design of a web-based e-voting system in the election of Abang None Jakarta by inserting an E-KTP numbers to be able to cast a vote in the election. Previously, the selection of Abang None Jakarta still uses SMS voting system that is considered to be less effective because the use of credits is considered more wasteful than the use of internet quota. In developing this web-based e-voting system, the researcher uses the SDLC (System Development Life Cycle) method and the Caesar Cipher algorithm method for voter data security. Besides that, the Gateaway SMS system is used to prevent any voter who uses someone else's E-KTP before casting a vote in an election. The e-voting system is made using the PHP and Xampp programming languages as its database. The e-voting system is expected to be used in making a transparent decision, speeding up the voting counting process, saving costs and preventing fraud when implementing e-voting in the election of Abang None Jakarta. The results of research is proven successful in terms of both the use of the web to conduct the election and the use of security in encryption and decryption of user data

    The New South Wales iVote System: Security Failures and Verification Flaws in a Live Online Election

    Full text link
    In the world's largest-ever deployment of online voting, the iVote Internet voting system was trusted for the return of 280,000 ballots in the 2015 state election in New South Wales, Australia. During the election, we performed an independent security analysis of parts of the live iVote system and uncovered severe vulnerabilities that could be leveraged to manipulate votes, violate ballot privacy, and subvert the verification mechanism. These vulnerabilities do not seem to have been detected by the election authorities before we disclosed them, despite a pre-election security review and despite the system having run in a live state election for five days. One vulnerability, the result of including analytics software from an insecure external server, exposed some votes to complete compromise of privacy and integrity. At least one parliamentary seat was decided by a margin much smaller than the number of votes taken while the system was vulnerable. We also found protocol flaws, including vote verification that was itself susceptible to manipulation. This incident underscores the difficulty of conducting secure elections online and carries lessons for voters, election officials, and the e-voting research community

    The Prospects of M-Voting Implementation in Nigeria

    Get PDF
    Since independence, an average of 50% of registered voters participates in voting [1]. Similarly, an increasing rate of apathy was observed between the electorate and the elect, which was not unconnected with lack of transparency, accountability, and probity on the part of government [2]. Thus the electorate did not see the need to subject itself to any stress. Consequently, government is very committed to implementing the forth coming elections through e-voting. This paper proposes the prospects of m-voting implementation in Nigeria through the use of mobile phones, PDAs, etc. with guaranteed security, secrecy, and convenience in a democratization process. It also reviews the level of adoption of GSM in Nigeria, the implication of voting through the GSM, and finally introducing m-voting innovation in the voting process to increase voters’ access and participation rate in election
    • 

    corecore