2022
DOI: 10.1007/978-3-030-89546-4_3
|View full text |Cite
|
Sign up to set email alerts
|

A Secure Electronic Voting System Using Multifactor Authentication and Blockchain Technologies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
8
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(8 citation statements)
references
References 28 publications
0
8
0
Order By: Relevance
“…These cloud-based environments include general cloud computing architecture [38][39][40][41], cloud storage [42][43][44][45], multi-cloud [46], cloud-based logistics information systems [47], cloud-based OTP services [48], multiple-agent cloud-based search engines [49], cloud health care [50,51], financial transactions [52], private cloud [53], and cloud-based web services [54]. Other non-cloud environments include cryptocurrency [55], websites and mobile apps [56], electronic payments [57,58], electronic voting systems [59][60][61][62], mobile voting systems [63], wireless networks [64], non-internet based applications [65], electronic document management systems [66], IoT networks [67][68][69], RFID infrastructure [70], wearable and virtual reality (VR) platforms with a gesture input interface [71], ATM systems [72], public multitouch displays [73], blockchain [74], attendance record management systems (ARMSs) [75], question-based authentication systems [76], the Internet of Medical Things (IoMT) [77], human-computer interaction (HCI) [78], ATM transactions…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…These cloud-based environments include general cloud computing architecture [38][39][40][41], cloud storage [42][43][44][45], multi-cloud [46], cloud-based logistics information systems [47], cloud-based OTP services [48], multiple-agent cloud-based search engines [49], cloud health care [50,51], financial transactions [52], private cloud [53], and cloud-based web services [54]. Other non-cloud environments include cryptocurrency [55], websites and mobile apps [56], electronic payments [57,58], electronic voting systems [59][60][61][62], mobile voting systems [63], wireless networks [64], non-internet based applications [65], electronic document management systems [66], IoT networks [67][68][69], RFID infrastructure [70], wearable and virtual reality (VR) platforms with a gesture input interface [71], ATM systems [72], public multitouch displays [73], blockchain [74], attendance record management systems (ARMSs) [75], question-based authentication systems [76], the Internet of Medical Things (IoMT) [77], human-computer interaction (HCI) [78], ATM transactions…”
Section: Literature Reviewmentioning
confidence: 99%
“…According to our survey, the MFA either used as 2FA, 3FA, or more. It is used either beside other techniques such as cipher text-policy attribute-based encryption (CP-ABE) [42,43], SSO [46], RSA algorithm and hash functions [50], SHA 1 and AES-128-CBC [38], AES 256 [74], pre-shared secret keys (PSK) [48], deep learning and leap motion controllers [83], enhanced Feistel block ciphers [59,60], Blockchain [61,63,65], VGG face models [44], CNN-LSTM-based classifiers, [70], and semantic ambient media frameworks (SAMF), which is an authoritative interface between smartphones and public displays [73]. A different number of factors are used, ranging from two to five.…”
mentioning
confidence: 99%
“…Hashing algorithms are also exploited where the MD5 algorithm in [25] and SHA3-224 with Burrows-Abadi-Needham logic in [34] were used to increase integrity. Meanwhile, we can mention the IDEA cipher [35], Present [42], the modified Mickey 2.0 [21], and the multi-factor authentication schemes [12,27], among other alternative solutions that might replace the commonly used ones.…”
Section: Rfid Security Solutionsmentioning
confidence: 99%
“…In a democracy, voting is the method by which the electorate appoints its representatives to government. In a direct democracy setting, voting is the method by which the electorates directly make decisions in order to turn bills into laws (Olaniyi et al, 2013). This implies that democracy must be a system of government where the people dictate the pace with the general consent of the governed.…”
Section: Introductionmentioning
confidence: 99%