2020
DOI: 10.1007/978-981-15-3369-3_63
|View full text |Cite
|
Sign up to set email alerts
|

Implementing a Mobile Voting System Utilizing Blockchain Technology and Two-Factor Authentication in Nigeria

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
5
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 20 publications
(5 citation statements)
references
References 18 publications
0
5
0
Order By: Relevance
“…It seeks to avail citizens of voting age the fundamental right to choose their leaders irrespective of location, time, and physical wellbeing. The e-voting system is a digitised procedure that is meant to circumvent the manual and tedious processes of a paper-based voting system [1] [32]. However, e-voting has been constantly bedevilled by some security challenges such as authentication and privacy of voters at one hand, and the confidentiality, integrity, and transparency of the voting process on the other hand [1] [35].…”
Section: Electronic Voting (E-voting)mentioning
confidence: 99%
See 2 more Smart Citations
“…It seeks to avail citizens of voting age the fundamental right to choose their leaders irrespective of location, time, and physical wellbeing. The e-voting system is a digitised procedure that is meant to circumvent the manual and tedious processes of a paper-based voting system [1] [32]. However, e-voting has been constantly bedevilled by some security challenges such as authentication and privacy of voters at one hand, and the confidentiality, integrity, and transparency of the voting process on the other hand [1] [35].…”
Section: Electronic Voting (E-voting)mentioning
confidence: 99%
“…The e-voting system is a digitised procedure that is meant to circumvent the manual and tedious processes of a paper-based voting system [1] [32]. However, e-voting has been constantly bedevilled by some security challenges such as authentication and privacy of voters at one hand, and the confidentiality, integrity, and transparency of the voting process on the other hand [1] [35]. Simply put, an authentication challenge arises when an e-voting system is infiltrated physically or digitally by unauthorized people.…”
Section: Electronic Voting (E-voting)mentioning
confidence: 99%
See 1 more Smart Citation
“…The HSM can be hardened to counter damage or tampering situated in a secure location to check unapproved access. Presently, the ultra-secure Personal Computers (PCs) come with an in-built HSM that requires two-factor authentication [15] in tamper-proof casing for the purpose of automatic deletion of the private key to forestall breaches of logical and physical security controls [16]. Theorem 1.…”
Section: Privacy Preservation Approachesmentioning
confidence: 99%
“…Difficulty in integration with legacy systems; [16,17]. Due to the presence of the above-mentioned properties and after looking at the frauds that occurred in digital electoral systems as discussed in Table 2, it is recommended that the Blockchain technology is used in Electronic Voting Machines to make them more intelligent and secure [18,19].…”
mentioning
confidence: 99%