201
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Secure I-voting system using QR code and biometric authentication

&

References

  • Ashok, K. T., & Ummal, S. B. (2012, March 21–23). Electronic voting machine - A review, proceedings of the international conference on pattern recognition, informatics and medical engineering. Salem, Tamilnadu, India.
  • Cybernetica. (2011). Internet voting solution.Cybernetica A S. Maealuse 2/1, 12618.
  • Drew, S., Travis, F., Zakir, D., Jason, K., Harri, H., Margaret, M., & Alex, H. (2014, November 3–7). Security analysis of the estonian internet voting system. CCS’14, Scottsdale, Arizona. ACM 978-1-4503-2957-6/14/11.
  • Ghahramani, M., Reza, J., & Mohammad, S. (2020, January). A secure biometric‑based authentication protocol for global mobility networks in smart cities. The Journal of Supercomputing, 76(11), 8729–8755. Springer Nature. https://doi.org/https://doi.org/10.1007/s11227-020-03160-x
  • Gope, P., & Hwang, T. (2016). An efficient mutual authentication and key agreement scheme preserving strong anonymity of the mobile user in global mobility networks. Journal of Network and Computer Applications, 62, 1–8. https://doi.org/https://doi.org/10.1016/j.jnca.2015.12.003
  • ICT. (2014, August). The digital society. Digital Government. Estonia.
  • Ivo, K., Tiit, P., & Jan, W. (2017). Estonian Voting Verification Mechanism Revisited Again. International Joint Conference on Electronic Voting, Bregenz. Austria. 2–5 October 2017. Springer.
  • Je-Gyeong, J., Jong-Won, S., & Hyung-Woo, L. (2007). Biometric digital signature key generation and cryptography communication based on fingerprint. In F. P. Preparata & Q. Fang (Eds.), FAW 2007, LNCS 4613 (pp. 38–49). c Springer-Verlag Berlin Heidelberg.
  • Koksal, M., Mehmet, S. K., Murat, C., & Isa, S. (2013). Estonian voting verification mechanism revisited. Middle East Technical University Turkey.
  • Meelis, K. (2011). Online participation in Estonia: Active voting, low engagement. Proceedings of the 5th International Conference on Theory and Practice of Electronic Governance. Tallinn Estonia. September 2011. ACM Newyork USA.
  • Li, X., Peng, J., Niu, J., Wu, F., Liao, J., & Choo, KKR. (2017). A robust and energy efficient authentication protocol for industrial internet of things. IEEE Internet Things J 5(3):1606–1615.
  • Phaisarn, S., & Wichian, P. (2010). QR-code generator, 2010 eighth international conference on ICT and knowledge engineering. Bangkok Thailand. Nov 24-25 2010. IEEE.
  • Priit, V. (2012). Internet voting in Estonia (Vol. 2). LNCS Springer Verlag Berlin Heidelberg.
  • Suresh, N. (2014). India the politics of green ideology. India Greens Party. New Delhi. https://www.asiapacificg-reens.org/news/india-politics-green-ideology
  • Susanne, C. (2010, October). E-voting handbook. Council of Europe Publishing.
  • Sven, H., Arnis, P., & Jan, W. (2015, December). Log analysis of Estonian internet voting 2013–2015. 5th International Conference on E-voting and Identity, VoteID 2015. Bern Switzerland. September 2-4 2015. Springer LNCS 9269.
  • Sven, H., & Jan., W. (2014). Verifiable internet voting in Estonia. 6th International Conference on Electronic Voting, Verifying the Vote, EVOTE 2014 (pp. 1–8), Lochau/Bregenz, Austria.
  • Sven, H., Tarvi, M., Priit, V., & Jan, W. (2016). Improving the verifiabilityof the Estonian internet voting, scheme. International Joint Conference on Electronic Voting,E-Vote-ID 2016: Bregenz Austria. Electronic Voting (pp. 92–107), Springer LNCS. volume 10141.
  • Tanel, T. (2011). Security analysis of Estonian I-voting system using attack tree methodologies [Master Thesis]. Tallinn University of Technology, Faculty of Information Technology, Department of Computer Science.
  • UIDAI. (2010). Aadhaar enabled services. whitepaper aadhaarenabled service delivery. Unique Identification Authority of India. Planning Commission. Government of India.
  • UIDAI. (2012, March 27). Role of Biometric Technology in Aadhaar Authentication. Authentication Accuracy Report. Unique Identification Authority of India. Planning Commission. Govt. of India (GoI).
  • Xiong, L., Jianwei, N., Saru, K., Fan, W., & Kim, K. (2017). A robust biometrics based three-factor authentication scheme for global mobility networks in smart city. Future Generation Computer Systems. Volume 83  June 2018, Pages 607–618. Elsevier. https://doi.org/https://doi.org/10.1016/j.future. 2017. 04. 012.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.