• No results found

Securing Internet Voting Protocol using Implicit Security Model and One Time Password

N/A
N/A
Protected

Academic year: 2020

Share "Securing Internet Voting Protocol using Implicit Security Model and One Time Password"

Copied!
6
0
0

Loading.... (view fulltext now)

Full text

Loading

Figure

Figure 1 : Implicit Data Model
Figure 3 : Secure Model of Internet Voting Protocol

References

Related documents

In the present study, the epitope of FbaA MAb2 was located in the amino acid region from residues 95 to 118 of FbaA, which overlapped with the binding sites of FH and FHL-1,

Two parameters influence the temperature during Huadian oil shale combustion namely: the fraction of fixed carbon oxidized to CO and CO 2 and the fraction of CaCO 3

We present herein a singular case of medullary colon cancer in which all of numerous lymph node metastases in the surgical resection specimen were completely necrotic in the face of

To demonstrate the usefulness of orthology expansion of relevant bibliography by our method, we evaluated zebrafish genes for their role in heart development and function using

Instructors of the basic communication course could examine the typical responses of their students within their self-evaluations and compare them to the metacognitive

Death of Abraham — birth of Esau and Jacob (twins) to Isaac and Rebekah — Esau sells birthright to Jacob, 25 3d. God confirms covenant to Isaac — Isaac misrepresents relationship

In the second example, 85% of the inner surface of the anechoic chamber which has a high value in the cost matrix is covered by ferrite tiles.. The obtained results of this example