Refine your search
Collections
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Asafe, Yekini N.
- Cryptography System for Online Communication Using Polyalphabetic Substitution Method
Abstract Views :123 |
PDF Views:2
Authors
Affiliations
1 Department of Computer Technology, Yaba College of Technology, Lagos, NG
1 Department of Computer Technology, Yaba College of Technology, Lagos, NG
Source
International Journal of Advanced Networking and Applications, Vol 6, No 1 (2014), Pagination: 2151-2157Abstract
Online communication is one of the common means of communication in this era of globe village. As the number of people being connected to online communication system through their mobile phone, computer or any other e-communication tools increases, there is need to secure the communication networks from adversaries (third parties) between the sender and receivers. There are many aspects to security approach in online communication environment. One essential aspect for secure communications is that of cryptography, which is the focus of this research. This research work aims at designing and implementing cryptosystem using a simple polyalphabetic cipher algorithm. The algorithm was coded with Java programming language. It was discovered that cryptography system with polyalphabetic cipher algorithm is better compared to Atbash cipher, Scytale cipher, Ceasar cipher etc, because it is very difficult for adversaries to decrypt an encrypted data without the key.Keywords
Cryptography, Cryptosystem, Decrypt Data, E-Communication, Encrypted Data, Java Programming Language, Online Communication, Polyalphabetic Cipher Algorithm.- Embedded Computer Application Software for Secured Voter Card Transfer:An Approach to Improve Electoral Integrity & Electoral Fraud Prevention Mechanism
Abstract Views :174 |
PDF Views:2
Authors
Affiliations
1 Computer Engineering Department, Yaba College of Technology, Yaba Lagos, NG
2 Computer Engineering Department, Lagos State Polytechnics, Ikorodu Lagos, NG
1 Computer Engineering Department, Yaba College of Technology, Yaba Lagos, NG
2 Computer Engineering Department, Lagos State Polytechnics, Ikorodu Lagos, NG
Source
International Journal of Advanced Networking and Applications, Vol 9, No 1 (2017), Pagination: 3294-3299Abstract
Voter registration helps to facilitate the credibility of the electoral process by preventing multiple voting as each person is only allowed to register once. One out of many causes of disenfranchisement of register voter is the failure to transfer their Voter Registration from one place to another when the case arises. That scenario has led to multiple registrations which is a criminal offense in Nigeria context. This research work is to address the difficulty involved in Voter Card Transfer. We design embedded application software proposed to be integrated into the INEC existing website. A flowchart was designed using the procedure for Voter Register Transfer in the INEC website. The prototype of the application was coded with C++. It was tested to meet the demands and objective of the study.Keywords
Electoral Fraud, Electoral Integrity, INEC, Voter Registration, Voter Card Transfer, Register Voter.References
- ] Ashok Kumar D., Ummal Sariba Begun T., (2011). Review Paper on Fingerprint based voting. Available at http: www.ijareeie.com.
- ] KohnoT., Stubblefield A’, Rubin A., Wallch D.S. (2003). Analysis of University Information Security Technical Report TR-2003-19.
- ] MalkawiM., Khsawneh M., Al-Jarah O., (2009). Modeling and Simulation of the IBIMA, Volume 8, 2009. Issn 1943-7765.
- ] Ashok Kumar D., UmmalSariba Begun T., (2011). A comparative study on fingerprint matching algorithm for EVM. Availble at http:pubs.sciepub.com/jcsa.
- ] Yekini, N.A., Oyeyinka I. K., Oludipe O.O., and Lawal O.N., 2012. Computer-Based Automated Voting Machine (AVM) for Elections in Nigeria. IJCSNS International Journal of Computer Science and Network Security, VOL.12 No.5, May 2012
- ] Hassan Adebayo (May 25, 2017). INEC-formally-accuses-kogi-gov-bello-of-double-voterregistration. Available at http://www.premiumtimesng.com/news/232202
- ] Tope Alabi May 24, 2017. Kogi State Governor in double voter’s registration scandal Available at:http://www.informationng.com/2017/05/kogi-state-governor-double-voters-registration-scandal.html
- ] Electoral Act, 2010: Act No. Short Title. Vol. 97. Page. 6. Electoral Act, 2010. A 1103-1202. Printed and Published by The Federal Government Printer, Abuja, Nigeria.
- ] (INEC n.d). Guidelines for Transfer of Registered Voters available at http://www.inecnigeria.org/?page_id=2051
- ] Hakeem Onapajo (2016) How Credible Were the Nigerian 2015 General Elections? An “Electoral Integrity” Framework of Analysis. Postdoctoral fellow, Department of Politics and International Studies, University of Zululand, South Africa.
- ] Aranuwa F.O.& O. Oriola O. (2012). Improved Electoral Fraud Prevention Mechanism for Efficient and Credible Elections in Nigeria. African Journal of Computing & ICT. Vol 5. No. 6. Dec 2012 ISSN 2006-1781. Available at www.ajocict.net. IEEE
- ] Kia, Bariledum (2013). Electoral Corruption and Democratic Sustainability in Nigeria. IOSR Journal of Humanities and Social Science (IOSR-JHSS) Volume 17, Issue 5 (Nov. - Dec. 2013), PP 42-48 e-ISSN: 2279-0837, p-ISSN: 2279-0845. www.iosrjournals.org www.iosrjournals.org Page 42-48
- ] Onwe, Sunday O., Nwogbaga David, M.E.2, Ogbu, Mark O. (2015). Effects of Electoral Fraud and Violence on Nigeria Democracy: Lessons from 2011 Presidential Election. IOSR Journal of Humanities and Social Science (IOSR-JHSS) Volume 20, Issue 4, Ver. 1 (Apr. 2015), PP 10-15 e-ISSN: 2279-0837, p-ISSN: 2279-0845. www.iosrjournals.org DOI: 10.9790/0837-20411015 www.iosrjournals.org
- ] Casmir etal (2013) Electoral Fraud in Nigeria: A Philosophical Evaluation of the Framework of Electoral Violence. 2013. Vol.3, No.4, 167-174 Published Online October 2013 in SciRes available at (http://www.scirp.org/journal/ojps)