Please use this identifier to cite or link to this item:
Title: Some studies on protocols and their implementation for secured electronic voting system
Researcher: Kalaichelvi V
Guide(s): Chandrasekaran R M
Keywords: Biometric smart card
Electronic voting system
Information and communication engineering
Upload Date: 20-Aug-2014
University: Anna University
Completed Date: 01/05/2012
Abstract: Election is a fundamental instrument of democracy that provides an official mechanism for the people to convey their views to form a government by democratic means Electronic voting has become the most important application in e governance and e democracy Recently few newlinecountries have taken the initiative to test and use electronic voting system Many countries believe that internet voting will be possible within the next decade In the traditional voting system the voter authenticates themselves by showing credentials this step is public and it is verified by the officials present in the polling place In this authentication verification is done manually and then they are allowed to cast their vote The traditional voting method is expensive and involves more human resources Due to these reasons the whole world is moving towards the trend of e voting newlineElectronic voting systems are expected to be the solution to overcome the shortfalls Since 1980 electronic voting schemes attracted many researchers In the last few years numerous numbers of researchers proposed different e voting systems and some countries and states around the world have implemented their e voting systems To overcome these drawbacks many cryptographers have newlineproposed a secure e voting system using cryptographic techniques While more and more protocols have been developed the set of security properties that a protocol has to achieve is evolved There are severalrequirements for a secure e voting system such as uniqueness efficiency fairness security privacy authentication anonymity and uncoercibility The several requirements can be satisfied partially by cryptographic techniques Thus researchers kept combining existing or created newlinecryptographic primitives to construct efficient electronic voting schemes with respect to these security requirements newline newline newline
Pagination: xv, 157p.
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File65.52 kBAdobe PDFView/Open
02_certificate.pdf273.06 kBAdobe PDFView/Open
03_abstract.pdf13.24 kBAdobe PDFView/Open
04_acknowledgement.pdf6.59 kBAdobe PDFView/Open
05_contents.pdf19.23 kBAdobe PDFView/Open
06_chapter1.pdf268.67 kBAdobe PDFView/Open
07_chapter2.pdf24.91 kBAdobe PDFView/Open
08_chapter3.pdf213.14 kBAdobe PDFView/Open
09_chapter4.pdf22.01 kBAdobe PDFView/Open
10_chapter5.pdf615.13 kBAdobe PDFView/Open
11_chapter6.pdf597.63 kBAdobe PDFView/Open
12_chapter7.pdf390.42 kBAdobe PDFView/Open
13_chapter8.pdf1.15 MBAdobe PDFView/Open
14_chapter9.pdf14.5 kBAdobe PDFView/Open
15_references.pdf23.61 kBAdobe PDFView/Open
16_publications.pdf7.63 kBAdobe PDFView/Open
17_vitae.pdf5.37 kBAdobe PDFView/Open

Items in Shodhganga are protected by copyright, with all rights reserved, unless otherwise indicated.