Please use this identifier to cite or link to this item:
http://repository.futminna.edu.ng:8080/jspui/handle/123456789/8969
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Oke, Babatope Anthony | - |
dc.contributor.author | Olaniyi, Olayemi Mikail | - |
dc.contributor.author | Aboaba, A. A. | - |
dc.contributor.author | Arulogun, Oladiran Tayo | - |
dc.date.accessioned | 2021-07-13T10:54:09Z | - |
dc.date.available | 2021-07-13T10:54:09Z | - |
dc.date.issued | 2019 | - |
dc.identifier.citation | Oke B. A., Olaniyi, O. M., Aboaba A. A., and Arulogun O. T. (2019) “Securing Electronic Voting System Using Crystographic Technique”, ATBU University Journal of Science, Technology & Education (JOSTE). 7(1), pp. 88-105 | en_US |
dc.identifier.uri | http://www.atbuftejoste.com/index.php/joste/article/view/571/pdf_445 | - |
dc.identifier.uri | http://repository.futminna.edu.ng:8080/jspui/handle/123456789/8969 | - |
dc.description | Securing Electronic Voting System Using Crystographic Technique | en_US |
dc.description.abstract | The aim of this paper is to design a secure electronic voting system that is based upon the electoral process for developing countries. The concept of voters’ information processing and storage arose immediate fears about election data security and privacy. If the voter’s choice is accessed by an illegitimate party, it may lead to malicious attack and any alteration of election results can affect the integrity of election. The need to secure electronic voting system through protection of voters’ data, confidentiality of casted vote during and after election becomes imminent. This paper addresses confidentiality and post-election auditing issues in electronic voting system using crystographic technique (a combination of cryptography and steganography). Electronic ballot confidentiality was addressed using crystographic algorithm involving synergistic combination of an enhanced Advance Encryption Standard (E-AES) and Space Insertion Text Semagram and post auditing issue of counted ballot was technically addressed with SHA-256 cryptographic Hash function. Performance evaluation of these techniques show that the developed integrated techniques can effectively handle confidentiality and post election auditng verification issues in electronic voting systems in digitally divided poll sites electoral votng scenerio. | en_US |
dc.language.iso | en | en_US |
dc.publisher | JOSTE ATBU | en_US |
dc.subject | Confidentiality | en_US |
dc.subject | Electronic Voting | en_US |
dc.subject | Authentication | en_US |
dc.subject | Security | en_US |
dc.subject | AES | en_US |
dc.subject | Auditing | en_US |
dc.title | Securing Electronic Voting System Using Crystographic Technique | en_US |
dc.type | Article | en_US |
Appears in Collections: | Computer Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Oke et al 2019.pdf | Securing Electronic Voting System Using Crystographic Technique | 766.36 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.