![Open Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextgreen.png)
![Restricted Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextred.png)
![Open Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextgreen.png)
![Open Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltext_open_medium.gif)
![Restricted Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextred.png)
![Restricted Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltext_restricted_medium.gif)
An Approach for Twofold Defend Secure Mobile Voting
Subscribe/Renew Journal
In modern world, innovation and growth on the mobile phones are astonishing. The foundation of a strong democracy is an informed and engaged citizenry. In many developing countries, nearly 60% of the citizenry uses mobile phones. In future, all the citizens will use mobiles in their habitual life. The wide-spread use of mobile devices has made it possible to develop mobile voting system as a complement to the existing electronic voting system. However, due to limited resource, it is challenging to achieve both efficiency and security strength for mobile voting system. Conventional system uses many symmetric and asymmetric algorithms like DES, RSA, etc to provide secure data sharing between users. Though, it is not efficient to provide security in mobile voting process. This paper proposes secure mobile voting which supports biometric identification and cryptographic algorithms to provide authentication, integrity, confidentiality and non repudiation.
Keywords
Mobile Voting, Cryptography, Biometric, Pairing, ECC.
User
Subscription
Login to verify subscription
Font Size
Information
![](https://i-scholar.in/public/site/images/abstractview.png)
Abstract Views: 304
![](https://i-scholar.in/public/site/images/pdfview.png)
PDF Views: 1