102,290 research outputs found
Implementation of Identity Based Encryption in e-Voting System
This paper explains about the design and
implementation of Identity Based Encryption (IBE) in
web-based Voting application. IBE is a completely
new approach to the problem of encryption which was
found on the traditional Public Key Infrastructure. It
can be used on any arbitrary string as a public key,
enabling data to be protected without the need for
certificates and reduction of infrastructure cost due to
certificates database maintenance. Protection
implemented in this application is a key server that
controls the mapping of identities to decryption keys
where the key is only one-time pad implementation. By
using the IBE technique, authentication and security
can be preserved in the web-based Voting application
where it provides integrity, authenticity, anonymity and
confidentiality in this application
The design of voting and rating services within Web4Groups
The Web4Groups EU supported project is one of the Telematics Application Development Projects of the Fourth Framework Program. The target of the project is to develop a distributed World Wide Web based, non-simultaneous group communication system that can also be considered as a complete redefinition of the traditional communication services like Usenet. The paper provides with a global overview on Web4Groups system and particularly the concepts followed during the design of Voting and Rating services within Web4Groups
RANCANG BANGUN APLIKASI E-VOTE PEMILIHAN KETUA RT PADA PERUMAHAN DUTA ASRI PALEM 7 BERBASIS WEB
This web-based E-Voting was created to facilitate the election of the RT Chair at Duta Asri Palem 7 Housing. The problem currently being faced is that in the ongoing elections, many residents cannot attend, there are still multiple elections and the vote count is still manual. The purpose of making this e-voting is to make it easier for residents to choose the Chair of the RT anywhere so that the expected vote results are more leverage. The research methods used in making this e-voting are field studies, literature studies and interviews. And the design method used by the researcher is the SDLC (System Development Life Cycle) method which is the whole process of building a system through several steps such as Planning, Analysis, Design and Implementation. The e-voting application is built with the PHP programming language, and utilizes the MySQL database as a database server. The expected result of making e-voting is that the problems that have occurred so far can be minimized and can streamline time and improve performance in carrying out the election of RT Chair in Housing Ambassador Asri Palm 7
Wireless Voting System Based on IEEE 802.15.4/Zigbee
PrĂĄce podrobnÄ popisuje bezdrĂĄtovĂœ protokol IEEE 802.15.4/ZigBee a zabĂœvĂĄ se nĂĄvrhem architektury bezdrĂĄtovĂ©ho hlasovacĂho systĂ©mu zaloĆŸenĂ© na zmĂnÄnĂ© technologii. Jako souÄĂĄst nĂĄvrhu je popsĂĄno vyuĆŸitĂ vĂœvojovĂ©ho kitu Freescale 1321xNSK k hlasovĂĄnĂ. StejnÄ tak schĂ©ma ĆĂzenĂ hlasovĂĄnĂ pomocĂ aplikaÄnĂho serveru, metoda zĂĄlohovĂĄnĂ dat a export vĂœsledkĆŻ hlasovĂĄnĂ na webovĂ© rozhrannĂ vÄetnÄ jejich zobrazenĂ. HlavnĂm cĂlem prĂĄce je realizace navrĆŸenĂ©ho systĂ©mu. V zĂĄvÄru prĂĄce je uvedena analĂœza vlastnostĂ implementovanĂ©ho systĂ©mu a shrnutĂ dosaĆŸenĂœch vĂœsledkĆŻ.In the work, a detail description of the wireless IEEE 802.15.4/ZigBee protocol is presented along with the architectural design of the wireless voting system based on the mentioned technology. The voting system proposed in the work is based on the Freescale's 1321xNSK development kit. The problems related to the design and implementation of the system by means of the kit as well as the problems related to the record-management scheme using the application server, the data backup method and web-export functions including the views are described in the work. At the end of the work, the proposed system is analyzed from several points of view and its main characteristics are summarized.
Online Voting System based on Image Steganography and Visual Cryptography
This paper discusses the implementation of an onlinevoting system based on image steganography and visualcryptography. The system was implemented inJava EE on a web-based interface, with MySQL databaseserver and Glassfish application server as thebackend. After considering the requirements of an onlinevoting system, current technologies on electronicvoting schemes in published literature were examined.Next, the cryptographic and steganography techniquesbest suited for the requirements of the voting systemwere chosen, and the software was implemented. Wehave incorporated in our system techniques like thepassword hashed based scheme, visual cryptography,F5 image steganography and threshold decryptioncryptosystem. The analysis, design and implementationphase of the software development of the votingsystem is discussed in detail. We have also used aquestionnaire survey and did the user acceptance testingof the system
Implementasi Metode Caesar Cipher dalam Penerapan Sistem E-Voting Berbasis Web pada Pemilihan Abang None Jakarta
In this increasingly modern era, technology has become a must in improving performance in every organization and various other activities. One example of the application of technology that will be explained in this research is the design of a web-based e-voting system in the election of Abang None Jakarta by inserting an E-KTP numbers to be able to cast a vote in the election. Previously, the selection of Abang None Jakarta still uses SMS voting system that is considered to be less effective because the use of credits is considered more wasteful than the use of internet quota. In developing this web-based e-voting system, the researcher uses the SDLC (System Development Life Cycle) method and the Caesar Cipher algorithm method for voter data security. Besides that, the Gateaway SMS system is used to prevent any voter who uses someone else's E-KTP before casting a vote in an election. The e-voting system is made using the PHP and Xampp programming languages as its database. The e-voting system is expected to be used in making a transparent decision, speeding up the voting counting process, saving costs and preventing fraud when implementing e-voting in the election of Abang None Jakarta. The results of research is proven successful in terms of both the use of the web to conduct the election and the use of security in encryption and decryption of user data
Recommended from our members
Application of Advanced Early Warning Systems with Adaptive Protection
This project developed and field-tested two methods of Adaptive Protection systems utilizing synchrophasor data. One method detects conditions of system stress that can lead to unintended relay operation, and initiates a supervisory signal to modify relay response in real time to avoid false trips. The second method detects the possibility of false trips of impedance relays as stable system swings âencroachâ on the relaysâ impedance zones, and produces an early warning so that relay engineers can re-evaluate relay settings. In addition, real-time synchrophasor data produced by this project was used to develop advanced visualization techniques for display of synchrophasor data to utility operators and engineers
The New South Wales iVote System: Security Failures and Verification Flaws in a Live Online Election
In the world's largest-ever deployment of online voting, the iVote Internet
voting system was trusted for the return of 280,000 ballots in the 2015 state
election in New South Wales, Australia. During the election, we performed an
independent security analysis of parts of the live iVote system and uncovered
severe vulnerabilities that could be leveraged to manipulate votes, violate
ballot privacy, and subvert the verification mechanism. These vulnerabilities
do not seem to have been detected by the election authorities before we
disclosed them, despite a pre-election security review and despite the system
having run in a live state election for five days. One vulnerability, the
result of including analytics software from an insecure external server,
exposed some votes to complete compromise of privacy and integrity. At least
one parliamentary seat was decided by a margin much smaller than the number of
votes taken while the system was vulnerable. We also found protocol flaws,
including vote verification that was itself susceptible to manipulation. This
incident underscores the difficulty of conducting secure elections online and
carries lessons for voters, election officials, and the e-voting research
community
The Prospects of M-Voting Implementation in Nigeria
Since independence, an average of 50% of registered voters participates in voting [1].
Similarly, an increasing rate of apathy was observed between the electorate and the elect,
which was not unconnected with lack of transparency, accountability, and probity on the
part of government [2]. Thus the electorate did not see the need to subject itself to any
stress. Consequently, government is very committed to implementing the forth coming
elections through e-voting. This paper proposes the prospects of m-voting implementation
in Nigeria through the use of mobile phones, PDAs, etc. with guaranteed security, secrecy,
and convenience in a democratization process. It also reviews the level of adoption of GSM
in Nigeria, the implication of voting through the GSM, and finally introducing m-voting
innovation in the voting process to increase votersâ access and participation rate in
election
- âŠ