The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposes a new electronic voting (e-voting) scheme that exploits confirmation numbers (CNs) and revised simplified verifiable re-encryption mixnet (R-SVRM). R-SVRM is a recently introduced mechanism of mixnet also used to develop an e-voting scheme where a vote is decomposed to protect its voter from being coerced to cast a particular vote. Though the scheme avoids complicated zero knowledge...
This paper proposes a new technique for DNA cryptography that uses dynamic DNA sequence table to enhance the level of security. While handling with secure data, the requirements like compression, speed-up computation and processing etc are crucial issues. Bio-molecular DNA features possess the capability to cope up with these requirements. Existing DNA cryptographic techniques usually consider fixed...
Universal re-encryption technique is an important tool that enables an intermediary to re-encrypt a ciphertext without any knowledge of corresponding public key. This technique, as shown by Golle et. al., conventionally utilizes ElGamal cryptosystem for its operations and generates two pairs of ciphertexts. With ElGamal cryptosystem, efficiency of this technique decreases as resources in terms of...
This paper proposes stroke matching based text recognizer (SMTR), a new approach to recognize Bangla handwritten text (BHT) that mainly focuses on off-line Bangla handwritten characters (BHCs) as well as words. For recognition, at first SMTR simplifies any font, size and shape of BHT into a set of strokes. Then it matches these strokes with its own set of strokes of Bangla characters those are already...
This paper presents a comparison between symmetric and asymmetric key encryption algorithm based decryption mixnets through simulation. Mix-servers involved in a decryption mixnet receive independently and repeatedly encrypted messages as their input, then successively decrypt and shuffle them to generate a new altered output from which finally the messages are regained. Thus mixnets confirm unlinkability...
This paper proposes an approach to detect emotion from human speech employing majority voting technique over several machine learning techniques. The contribution of this work is in two folds: firstly it selects those features of speech which is most promising for classification and secondly it uses the majority voting technique that selects the exact class of emotion. Here, majority voting technique...
This paper proposes verb based machine translation (VBMT), a new approach of machine translation (MT) from English to Bangla (EtoB). For translation, it simplifies any form (i.e. simple, complex, compound, active and passive form) of English sentence into the simplest form of English sentence i.e. subject plus verb plus object. When compared with existing rule based EtoB MT schemes, VBMT doesn't employ...
A mixnet is a multi-stage system that accepts encrypted messages as its input and generates a new altered output while exploiting cryptographic operations and repeated permutations to ensure the untraceability between the input and the output messages. Based on the employed cryptographic operations, the main types of mixnets and their variants are: decryption, re-encryption, universal re-encryption...
This paper presents a comparison between two blind signature (BS) schemes to conduct the simulation of a traditional BS based electronic voting system (EVS). A BS scheme is a cryptographic protocol that plays a vital role to conduct the electronic transactions of privacy-related applications securely but anonymously. It ensures the confidentiality of the private information of a user while she involves...
Unlike traditional systems, electronic voting (e-voting) systems exploit computerized voting equipments, computer networks and cryptographic protocols to conduct elections. They possess the ability to merge both verifiability and ballot secrecy successfully at the same time, a combination that cannot be achieved by other means. Hence, elections conducted by e-voting systems are expected to be efficient,...
This paper proposes a touchless written Bengali character recognizer (TBR), a new touchless approach to write and an intelligent approach to recognize Bengali characters. In TBR, the inputs of Bengali characters have been taken by touchless fashion i.e. by sensing specific color object with a moving hand tracking in front of a webcam. Then they have been recognized by efficient Artificial Neural Network...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.