[PDF][PDF] UML based modeling of ECDSA for secured and smart E-Governance system

A Roy, S Karforma - … Science & Information Technology (CS & IT …, 2013 - researchgate.net
In comparison to the conventional form of administration, nowadays the E-Governance have
become the smart way of deployment of administration by the authority under its jurisdiction …

A survey of cryptographic and stegano-cryptographic models for secure electronic voting system

OM Olaniyi, AO Tayo… - Covenant …, 2013 - journals.covenantuniversity.edu.ng
The success rate of an electronic voting system in electronic decision making is dependent
on security, authenticity and integrity of pre-electoral, electoral and post electoral phases of …

[PDF][PDF] OBJECT-ORIENTED METRICS ANALYSIS FOR IMPLEMENTATION OF AUTHENTICATION IN SMART CARD BASED E-GOVERNANCE MECHANISM

A Roy - Researchers World, 2013 - academia.edu
The gradual scientific enhancements have made the present day society highly technology
dependent in nature. To attend this community, nowdays the state owned agencies are …

[PDF][PDF] Survey on Biometric applications for implementation of authentication in smart Governance

S Sarkar, A Roy - Researchers World, 2013 - academia.edu
With large scale proliferation of internet and network, more and more people tend to
communicate through the insecure network channels. So, to avoid illegal access of …

E-Governance Security using Public Key Cryptography with special focus on ECC

P Barman, B Saha - Available at SSRN 4771424, 2013 - papers.ssrn.com
Abstract his paper gives an idea on E-Governance Security using public key cryptography.
The public key cryptography technique called Elliptic Curve Cryptography (ECC) become …