3225 Chapters
Medium 9781601322401

On the Implementation of one Registration, one Vote in South African Elections

Hamid R. Arabnia; Azita Bahrami; Fernando G. Tinetti; Leonidas Deligiannidis; George Jandieri; and Ashu M. G. Solo (Editors) Mercury Learning and Information PDF

184

Int'l Conf. e-Learning, e-Bus., EIS, and e-Gov. | EEE'13 |

On the Implementation of one Registration, one Vote in South African Elections

Bassey Isong1, Ndwamato Netshipise1, Gilbert Dzawo1 and Munienge Mbodila2

Department of Computer Science & Information Systems, University of Venda, Thohoyandou, South Africa

2

Science Foundation - Computer Science Unit, University of Venda, Thohoyandou, South Africa

1

Abstract - In any democratic setting, having regular free and fair elections is very critical to the stability of the nation as building trust and confidence is to promoting citizen’s participation. In South Africa (SA) elections, though free and fair as seen, technically the system does not guarantee one man with one registration and one vote. Consequently, voter’s fraud are not exception, though remains “closed”. The system needs to be improved in order to protect the integrity of the elections. Therefore, the objective of this paper is to implement a new approach for SA elections based on realtime voter registration and identification. As part of the implementation, a novel system prototype called VOTEX

See All Chapters
Medium 9781601323170

Capstone Experience with Watermarking

Hamid R. Arabnia Azita Bahrami, Leonidas Deligiannidis, George Jandieri, Ashu M. G. Solo, and Fernando G. Tinetti CSREA Press PDF

362

Int'l Conf. Frontiers in Education: CS and CE | FECS'14 |

Capstone Experience with Watermarking

Suhair Amer

Department of Computer Science, Southeast Missouri State University, Cape Girardeau, MO, USA

Abstract – This paper documents a capstone experience of one group. The Students were required to investigate watermarking and they were able to enhance the performance of the investigated system. The paper maps student activities to the university’s learning outcomes for undergraduate students. In addition, it lists how their product was assessed.

Keywords: capstone, watermarking, senior project.

1

1.1

Introduction

Capstone Experiences Defined

Requiring students to publicly present their work.

Evaluating senior seminar papers based on program quality and learning outcomes.

1.2

University Learning Outcomes for

Undergraduate Students

Next is a list of several university outcomes for undergraduate students from which an institution can adapt depending on their desired capstone experience [Campbell and Lambright

See All Chapters
Medium 9781601323231

Session - Information and Knowledge Engineering and Management + Feature Extraction and AI

Hamid R. Arabnia, Leonidas Deligiannidis, Ray Hashemi, George Jandieri, Ashu M. G. Solo, and Fernando G. Tinetti CSREA Press PDF
Medium 9781601324023

Parallel Processing Algortithms, Systems, Applications, and Related Issues

Edited by: Hamid R. Arabnia, Hiroshi Ishii, Kazuki Joe, Hiroaki Nishikawa, Hayaru Shouno, Lou D'Alotto, George A. Gravvanis, George Jandieri, Georgios Sirakoulis, Ashu M. G. Solo, William Spataro, Fernando G. Tinetti, Giuseppe A. Trunfio CSREA Press PDF
Medium 9781601322593

Multi-Vendor PayWord with Payment Approval

Kevin Daimi; Hamid R. Arabnia; Michael R. Grimaila; Kathy Liszka; George Markowsky; and Ashu M. G. Solo (Editors) Mercury Learning and Information PDF

Int'l Conf. Security and Management | SAM'13 |

265

Multi-Vendor PayWord with Payment Approval

A. Huszti

Faculty of Informatics, University of Debrecen, Debrecen, Hungary

Abstract— One of the most well known micropayment scheme is the PayWord scheme. It is designed to be onevendor, so if we apply it for multiple vendors, it does not protect against double spending. We extended the PayWord scheme, it supports shopping at multiple vendors without an on-line broker or an on-line secure database. The proposed credit-based system uses one hash chain, hence besides the secret signature key only the seed and a random value should be securely stored. Our scheme is analyzed in applied pi calculus, we prove that it fulfills payment approval, secure payment authorization, secrecy of payment information and unreusability.

Keywords: PayWord, multi-vendor micropayment, payment approval, applied pi calculus

1. Introduction

In recent years electronic commerce has grown rapidly as Internet and web technologies have progressed. Usually content and service providers charge very small amount (e.g. less than a dollar), hence a special payment solution, called micropayment, is required. Compared to macropayment schemes, the computational time of micropayment schemes are less. Instead of public key cryptosystems, they use oneway, collision-resistant hashing extensively. One can find more information about micropayments in [11].

See All Chapters

See All Chapters