Repository logo
  • English
  • Català
  • ÄŒeÅ¡tina
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Italiano
  • LatvieÅ¡u
  • Magyar
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Srpski (lat)
  • Suomi
  • Svenska
  • Türkçe
  • Tiếng Việt
  • Log In
    New user? Click here to register. Have you forgotten your password?
Repository logo
    Communities & Collections
    All of DSpace
  • English
  • Català
  • ÄŒeÅ¡tina
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Italiano
  • LatvieÅ¡u
  • Magyar
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Srpski (lat)
  • Suomi
  • Svenska
  • Türkçe
  • Tiếng Việt
  • Log In
    New user? Click here to register. Have you forgotten your password?
  1. Home
  2. Browse by Author

Browsing by Author "Benedict, Logatho"

Now showing 1 - 1 of 1
Results Per Page
Sort Options
  • Loading...
    Thumbnail Image
    Item
    Authentication voters on mobile E-Voting technology: a case students' Election System at the University of Dar es Salaam
    (University of Dar es Salaam, 2015) Benedict, Logatho
    Mobile phones are set to dominate most of the human activities such as informal and formal communications, mobile banking, business transactions and advertisement. Currently the use of mobile phones on supporting the process of voting such as vote casting has a little bit started but it is lacking security. Most of the research has been done on how to authenticate user on e-voting based on remote internet through personal computer, Laptop and other special device purposely made for e-voting Mugisha (2008). This work proposes a method on how to authenticate voter on mobile e-voting process through his/her mobile phone number supported with registration number and password. user is required to create password must first be stored in a database used for matching the correct stored and encrypted mobile phone number and registration numbers. the stored phone number is encrypted by using MD5 hash function and password is encrypted by using two fish encryption function. The two algorithms are used because are strong enough and light to be used in mobile phone applications. The issue of coercion is still not completely solved for this type of e-voting as it is possible for someone to either by force or bribery tell another person to vote in favour for some preferred candidates. Thus alleviating the problem of coercion on mobile e-voting is left as a future work.

About Library

The University of Dar es Salaam Library is a vital source of scholarly information that facilitates users to get access to learning and research resources during their studies. It provides access to a wide range of resources in both print and digital formats and conducive reading environment for users, regardless of their physical conditions. All registered users are eligible to access library resources and can borrow print materials from general shelves for a specific period of time.

Useful Links

Koha Staff Login

University Research Repository

WebMail

Aris

Book Study Room

Mara Oral History

Hansard

SOCIAL MEDIA

Instagram

Facebook

Twitter

YouTube

WhatsApp

Ask Librarian

Contact Us

Postal Address
P.O.Box 35092
Dar es Salaam

Call Us: +255 22 2410500/9 Ext. 2165 ; Direct line +255 22 2410241

Fax No:: +255 22 2410241

Email:: directorlibrary@udsm.ac.tz

2025 University of Dar es Salaam - University Of Dar Es Salaam Library
Term of use / Privacy Policy