Please use this identifier to cite or link to this item: http://repository.futminna.edu.ng:8080/jspui/handle/123456789/11603
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSalami, Habu J.-
dc.contributor.authorAdebayo, O. S.-
dc.contributor.authorIsah, Abdulkadir Onivehu-
dc.contributor.authorLawal, K. H.-
dc.contributor.authorAlhassan, J. K.-
dc.date.accessioned2021-07-26T09:58:32Z-
dc.date.available2021-07-26T09:58:32Z-
dc.date.issued2018-
dc.identifier.urihttps://www.proquest.com/openview/4bc70d4849cbb6d2247fe7ad2b7ab072/1?cbl=2030612&pq-origsite=gscholar-
dc.identifier.urihttp://repository.futminna.edu.ng:8080/jspui/handle/123456789/11603-
dc.description.abstractElectronic voting has become the most preferred and generally acceptable voting method in the 21 century. Advanced and developed countries are constantly reviewing their e-voting systems. However, the cyber security problem associated with the e-voting system has been giving concerns to cyber security experts and researchers. The authentication methods employed in existing e-voting system is for a voter to input a unique identification number that has been assigned after accreditation. This is to confirm of the voter's details in the voter registration data base. This paper seeks to develop a secured e-voting system that integrates a second order authentication in the form of One-Time Password to again confirm the voters' details in the registration data base before voting is allowed. Java programming language was employed in coding the OTP algorithm into the existing e-voting system algorithm. The e-voting system is more secure with this work.en_US
dc.language.isoenen_US
dc.publisher2nd International Conference on Information Communication Technology and Its Application (ICTA 2018)en_US
dc.subjectE-votingen_US
dc.subjectSecurityen_US
dc.subjectOTPen_US
dc.subjectAuthenticationen_US
dc.subjectDevelopmenten_US
dc.titleDevelopment of a Secured e-Voting System with OTP as Second Order Authenticationen_US
dc.typeArticleen_US
Appears in Collections:Cyber Security Science



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.