Search alternatives:
elections » election (Expand Search), selection (Expand Search)
Showing 1 - 10 results of 10 for search 'tamper elections', query time: 0.10s Refine Results
  1. 1
  2. 2

    Trust Mechanism Based Secure Cluster Head Election Algorithm for Electric Power Wireless Sensor Networks by Lei WEI, Jiangtao XU, Yajuan GUO, Daohua ZHU

    Published 2023-08-01
    “…A trust mechanism based secure cluster head election algorithm is thus proposed for wireless sensor networks. …”
    Get full text
    Article
  3. 3

    Secure E-Voting System Utilizing Fingerprint Authentication, AES-GCM Encryption and Hybrid Blind Watermarking by Asia Abdullah, Nada Hussein M. Ali

    Published 2025-06-01
    “… Ensuring security, integrity, and reliability of the election process consider as the main challenges in the electronic voting system. …”
    Get full text
    Article
  4. 4
  5. 5
  6. 6
  7. 7

    Blockchain-Driven E-Voting: Enhancing Security and Integrity with Smart Contracts by Urooj Waheed, Muhammad Ahsan Khan, Yusra Mansoor, Huma Jamshed, Ahmad Hussain

    Published 2025-06-01
    “…The transparency, immutability, and resistance to tampering provided by blockchain enhance the reliability and credibility of the voting process. …”
    Get full text
    Article
  8. 8

    Research on the Raft improved algorithm for anti-Byzantine nodes by WANG Xiaowei, LI Jie

    Published 2025-03-01
    “…ObjectivesIn order to solve the problem of malicious election and log tampering caused by Byzantine nodes in original Raft algorithm, an AntiB-Raft (Anti-Byzantine Raft) algorithm was proposed to resist Byzantine nodes.MethodsWhen the candidate requested to replace the Leader, the heartbeat monitoring threshold mechanism was used to determine whether the candidate can successfully obtain enough votes to become the new Leader, which was agreed that only when more than half of the nodes detected that the current Leader was really down, the candidate can obtain more than half of the votes and become the new Leader, so as to prevent the Byzantine node from maliciously pulling votes when current Leader was not down, which would result in the replacement of the normal Leader. …”
    Get full text
    Article
  9. 9

    BS-SCRM: a novel approach to secure wireless sensor networks via blockchain and swarm intelligence techniques by Jing Xiao, Chaoqun Li, Zhigang Li, Jie Zhou

    Published 2024-04-01
    “…The proposed BS-SCRM method is structured in two phases: (1) an enhanced cluster head (CH) election utilizing an elite strategy-enhanced Whale Optimization Algorithm (WOA) that considers node energy and proximity to the base station, and (2) a secure data on-chain phase where blockchain comes into play, encrypting and validating cluster data to safeguard integrity and prevent tampering. …”
    Get full text
    Article
  10. 10

    Hardware and Software Methods for Secure Obfuscation and Deobfuscation: An In-Depth Analysis by Khaled Saleh, Dirar Darweesh, Omar Darwish, Eman Hammad, Fathi Amsaad

    Published 2025-06-01
    “…For example, software and hardware have become highly susceptible to various threats, like reverse engineering, cloning, tampering, and IP piracy. While various techniques exist to enhance software and hardware security, including encryption, native code, and secure server-side execution, obfuscation emerges as a preeminent and cost-efficient solution to address these challenges. …”
    Get full text
    Article