DOI:10.20894/IJWT.
Periodicity: Bi Annual.
Impact Factor:
SJIF:4.78 & GIF:0.428
Submission:Any Time
Publisher: IIR Groups
Language: English
Review Process:
Double Blinded

News and Updates

Author can submit their paper through online submission. Click here

Paper Submission -> Blind Peer Review Process -> Acceptance -> Publication.

On an average time is 3 to 5 days from submission to first decision of manuscripts.

Double blind review and Plagiarism report ensure the originality

IJWT provides online manuscript tracking system.

Every issue of Journal of IJWT is available online from volume 1 issue 1 to the latest published issue with month and year.

Paper Submission:
Any Time
Review process:
One to Two week
Journal Publication:
June / December

IJWT special issue invites the papers from the NATIONAL CONFERENCE, INTERNATIONAL CONFERENCE, SEMINAR conducted by colleges, university, etc. The Group of paper will accept with some concession and will publish in IJWT website. For complete procedure, contact us at admin@iirgroups.org

Paper Template
Copyright Form
Subscription Form
web counter
web counter
Published in:   Vol. 2 Issue 2 Date of Publication:   December 2013

Highly Secured Online Voting System (OVS) Over Network

S.N.Mugunthan,D.Parameswari

Page(s):   35-39 ISSN:   2278-2397
DOI:   10.20894/IJWT.104.002.002.003 Publisher:   Integrated Intelligent Research (IIR)


  1. R. Mercuri,   "Electronic Vote Tabulation Checks and Balances",   PhD thesis, University of Pennsylvania, Philadelph   ,2000
    View Artical

  2. Niko Farhi, Morgan Llewellyn, Ben Riva1, Alon Rosen, Amnon Ta-Shma, Douglas Wikstr?m,   "A New Implementation of a Dual (Paper and Cryptographic) Voting System Jonathan Ben-Nun
    View Artical

  3. B. Swaminathan, J. Cross Datson Dinesh,   "Highly Secure Online Voting System with Multi Security using Biometric and Steganography
    View Artical

  4. J. Schwartz,   "Online Voting Canceled for Americans Overseas",   The New York Times   ,2004
    View Artical

  5. D. Jefferson, A. Rubin, B. Simmons, and D. Wagner,   "A Security Analysis of the Secure Electronic Registration and Voting Experiment (SERVE)   ,2004
    View Artical

  6. T. Kohno, A. Stubblefield, A. Rubin, and D. Wallach,   "Analysis of an Electronic Voting System",   IEEE Symposium on Security and Privacy   ,2004
    View Artical

  7. Ankit Anand, Pallavi Divya,   "An Efficient Online Voting System
    View Artical

  8. Attacking the Washington, D.C.,   "Internet Voting System Scott Wolchok",   Eric Wustrow, Dawn Isabel, and J. Alex Halderman
    View Artical

  9. Adida, B.,   "Helios: Web-based open-audit voting",   Proc. 17th USENIX Security Symposium   ,2008
    View Artical

  10. Rubin, A,   "Security considerations for remote electronic voting over the Internet
    View Artical

  11. D. Chaum,   "Blind Signature Systems",   U.S. Patent   ,1988
    View Artical

  12. Zuowen Tan, Zhuojun Liu, Chunming Tang,   "Digital Proxy Blind Signature Schemes Based on DLP and ECDLP",   MM Research Preprints   ,2002
    View Artical

  13. J. Gilberg,   "E-VOTE: An Internet-based Electronic Voting System: Consolidated Prototype 2 Documentation
    View Artical

  14. I. Damg?rd, J. Groth, and G. Salomonsen,   "Secure Electronic Voting",   Kluwer Academic Publishers   ,2003
    View Artical

  15. A. Riera and P. Brown,   "Bringing Confidence to Electronic Voting   ,2004
    View Artical

  16. Lin, Y. and Chlamtac, I.,   "Wireless and Mobile Network Architectures",   Wiley Publications   ,2000
    View Artical

  17. R.J. Baron,   "Mechanisms of Human Facial Recognition   ,1981
    View Artical

  18. Cardinaux, F., Sanderson, C., and Bengio, S.,   "User authentication via adapted statistical models of face images",   IEEE Transactions on Signal Processing   ,2006
    View Artical

  19. Lee, K.-C., Ho, J., and Kriegman, D.,   "Acquiring linear subspaces for face recognition under variable lighting",   IEEE Transactions on Pattern Analysis and Machine    ,2005
    View Artical

  20. Maturana, D., Mery, D., and Soto, A,   "Face recognition with local binary patterns, spatial pyramid histograms and naive bayes nearest neig",   International Conference of the Chilean Computer S   ,2009
    View Artical

  21. Rowley, H., Baluja, S., & Kanade, T,   "Neural network-based face detection",   IEEE Trans. on Pattern Analysis and Machine Intell   ,1998
    View Artical

  22. R. Mercuri,   "Electronic Vote Tabulation Checks and Balances",   PhD thesis, University of Pennsylvania, Philadelph   ,Vol.    ,2015
    View Artical

  23. Niko Farhi, Morgan Llewellyn, Ben Riva1, Alon Rosen, Amnon Ta-Shma, Douglas Wikstr?m,   "A New Implementation of a Dual (Paper and Cryptographic) Voting System Jonathan Ben-Nun   ,Vol.
    View Artical

  24. B. Swaminathan, J. Cross Datson Dinesh,   "Highly Secure Online Voting System with Multi Security using Biometric and Steganography",   INTERNATIONAL JOURNAL OF ADVANCED SCIENTIFIC RESEA   ,Vol.2   ,Issue 2   ,2012
    View Artical

  25. D. Jefferson, A. Rubin, B. Simmons, and D. Wagner,   "A Security Analysis of the Secure Electronic Registration and Voting Experiment (SERVE)   ,2004
    View Artical

  26. T. Kohno, A. Stubblefield, A. Rubin, and D. Wallach,   "Analysis of an Electronic Voting System",   IEEE Symposium on Security and Privacy   ,Vol.    ,2004
    View Artical

  27. Ankit Anand, Pallavi Divya,   "An Efficient Online Voting System",   International Journal of Modern Engineering Resear   ,Vol.2   ,Issue 4   ,2012
    View Artical

  28. Adida, B.,   "Helios: Web-based open-audit voting",   Proc. 17th USENIX Security Symposium   ,Vol.    ,2008
    View Artical

  29. Rubin, A,   "Security considerations for remote electronic voting over the Internet   ,Vol.
    View Artical

  30. D. Chaum,   "Blind Signature Systems",   U.S. Patent   ,1988
    View Artical

  31. Zuowen Tan, Zhuojun Liu, Chunming Tang,   "Digital Proxy Blind Signature Schemes Based on DLP and ECDLP",   MM Research Preprints   ,Vol.    ,2002
    View Artical

  32. R.J. Baron,   "Mechanisms of Human Facial Recognition",   International Journal of Man-Machine Studies   ,Vol.15   ,Issue 2   ,1981
    View Artical

  33. Cardinaux, F., Sanderson, C., and Bengio, S.,   "User authentication via adapted statistical models of face images",   IEEE Transactions on Signal Processing   ,Vol.54   ,Issue 1   ,2006
    View Artical

  34. Lee, K.-C., Ho, J., and Kriegman, D.,   "Acquiring linear subspaces for face recognition under variable lighting",   IEEE Transactions on Pattern Analysis and Machine    ,Vol.27   ,Issue 5   ,2005
    View Artical

  35. Niko Farhi, Morgan Llewellyn, Ben Riva1, Alon Rosen, Amnon Ta-Shma, Douglas Wikstr?m,   "A New Implementation of a Dual (Paper and Cryptographic) Voting System Jonathan Ben-Nun
    View Artical

  36. D. Jefferson, A. Rubin, B. Simmons, and D. Wagner,   "A Security Analysis of the Secure Electronic Registration and Voting Experiment (SERVE)",   Security analysis of SERVE   ,Vol.    ,Issue    ,2004
    View Artical

  37. Ankit Anand, Pallavi Divya,   "An Efficient Online Voting System",   International Journal of Modern Engineering Resear   ,Vol.2   ,Issue 4   ,2012
    View Artical

  38. Attacking the Washington, D.C.,   "Internet Voting System Scott Wolchok",   Eric Wustrow, Dawn Isabel, and J. Alex Halderman   ,Vol.    ,2010
    View Artical

  39. Adida, B.,   "Helios: Web-based open-audit voting",   Harvard University   ,2008
    View Artical

  40. Rubin, A,   "Security considerations for remote electronic voting over the Internet",   Communications of the ACM   ,Vol.45   ,Issue 12   ,2002
    View Artical

  41. Maturana, D., Mery, D., and Soto, A,   "Face recognition with local binary patterns, spatial pyramid histograms and naive bayes nearest neig",   Chilean Computer Science Society (SCCC)   ,Vol.    ,2009
    View Artical

  42. B. Swaminathan, J. Cross Datson Dinesh,   "Highly Secure Online Voting System with Multi Security using Biometric and Steganography",   INTERNATIONAL JOURNAL OF ADVANCED SCIENTIFIC RESEA   ,Vol.2   ,Issue 2
    View Artical

  43. D. Jefferson, A. Rubin, B. Simmons, and D. Wagner,   "A Security Analysis of the Secure Electronic Registration and Voting Experiment (SERVE)   ,2004
    View Artical

  44. T. Kohno, A. Stubblefield, A. Rubin, and D. Wallach,   "Analysis of an Electronic Voting System",   IEEE Symposium on Security and Privacy   ,Vol.    ,2004
    View Artical

  45. Attacking the Washington, D.C.,   "Internet Voting System Scott Wolchok",   Eric Wustrow, Dawn Isabel, and J. Alex Halderman   ,Vol.    ,2012
    View Artical

  46. Rubin, A,   "Security considerations for remote electronic voting over the Internet",   Communications of the ACM   ,Vol.45   ,Issue 2   ,2012
    View Artical

  47. D. Chaum,   "Blind Signature Systems",   U.S. Patent   ,1988
    View Artical

  48. J. Gilberg,   "E-VOTE: An Internet-based Electronic Voting System: Consolidated Prototype 2 Documentation",   Computer Security Applications Conference   ,Vol.
    View Artical

  49. I. Damg?rd, J. Groth, and G. Salomonsen,   "Secure Electronic Voting",   Kluwer Academic Publishers   ,2003
    View Artical

  50. Cardinaux, F., Sanderson, C., and Bengio, S.,   "User authentication via adapted statistical models of face images",   IEEE Transactions on Signal Processing   ,Vol.    ,2006
    View Artical

  51. Maturana, D., Mery, D., and Soto, A,   "Face recognition with local binary patterns, spatial pyramid histograms and naive bayes nearest neig",   International Conference of the Chilean Computer S   ,Vol.    ,2009
    View Artical

  52. Rowley, H., Baluja, S., & Kanade, T,   "Neural network-based face detection",   IEEE Trans. on Pattern Analysis and Machine Intell   ,Vol.20   ,Issue 1   ,1998
    View Artical