Download as pdf or txt
Download as pdf or txt
You are on page 1of 23

Seminar Report

On
“M-Voting”
Submitted in Partial Fulfillment of Award of Degree of Bachelor of
Technology in Electronics & Communication Engineering

Submitted by
Divyank Ranjan
2K18
B. Tech (ECE)
CSJMA18001390083
To
Department of Electronics & Communication Engineering, U.I.E.T.
CSJM University, Kanpur
UNIVERSITY INSTITUTE OF ENGINEERING AND TECHNOLOGY

C.S.J.M. UNIVERSITY KANPUR

DEPARTMENT OF ELECTRONICS AND COMMUNICATION


ENGINEERING

CERTIFICATE
This is to certify that the project entitled “M-VOTING” has been
submitted by DIVYANK RANJAN under my guidance in partial fulfillment of the degree of
Bachelor of Technology in “ELECTRONICS AND COMMUNICATION ENGINEERING”,
FROM UNIVERSITY INSTITUTE OF ENGINEERING AND TECHNOLOGY, C.S.J.M.
UNIVERSITY, KANPUR during the academic year 2019-2020.

HEAD OF DEPARTMENT PROJECT GUIDE PROJECT INCHARGE


Er. Anand Kumar Gupta Er. Amit Kumar Katiyar Er. Ajeet Kumar Srivastava
ACKNOWLEDGEMENT

It is matter of great pleasure for us to submit this project report on “M-VOTING”,


as a part of curriculum for award of “Bachelor of Technology in Electronics and
Communication Engineering” at UNIVERSITY INSTITUTE OF
ENGINEERING & TECHNOLOGY, CSJM UNIVERSITY, KANPUR. We
are thankful to our project guide Er. Amit Kumar Katiyar for their constant
encouragement and able guidance. We are also thankful to Er. Anand Kumar
Gupta, Head of Electronics & Communication Engineering Department & Er.
Ajeet Kumar Srivastava, Project Incharge for her valuable support.

We take this opportunity to express our deep sense of gratitude towards those, who
have helped us in various ways, for preparing our project. At the last but not least,
we are thankful to our parents, who had encouraged & inspired us with their
blessings.

DATE: Divyank Ranjan (083)


PLACE: Kanpur
Abstract

The critical issue in elections is choosing a leader who will represent his nation and preserve its citizens’ rights with
the threat of a criminal element attempting to influence the outcome of the election. Unfortunately, such disruptions
have occurred at many paper-based voting stations, and also in some electronic voting systems. Manual, or paper-
based voting is the most widely used voting system, but its integrity can be questioned, since the votes are gathered
and counted by hand, which decreases the likelihood of every vote being counted, either accidentally or
intentionally. Electronic voting systems have emerged to solve most of the problems that occur in manual voting.
However, the criminal element, with their knowledge of how to exploit technical loopholes, attempts to take
advantage of these problems, thwarting any efforts to hold fair elections. To avoid the mistakes made by both
manual and electronic voting systems, we have developed the M-Voting system to try to achieve the desired goal,
which is to preserve the integrity of elections. M-Voting is a mobile phone application that uses three level of
security, which are username and password, national ID and fingerprint, and a strong dedicated security algorithm.
These techniques prevent votes from being deleted or changed, enhance integrity and put an end to criminal acts.
The results showed that M-Voting is a highly secured mobile application that facilitates the vote process for most of
people, since they only need a mobile phone and an Internet connection to participate in the election process.
Abbreviations

EVM Electronic Voting Machine


DNA Deoxyribonucleic Acid
SMS Short Message Service
AFIS Automated Fingerprint Identification System
GSM Global System for Mobile Communications
AES Advanced Encryption Standard
List of Figures

Figure Page No.


Ballot Box 8
Electronic Voting Machine 9
Mobile Voting System 11
Biometric 12
Most Prominent Mobile Voting Systems 13
M-Voting System Description 15
Technology and Tools used in the project 18
M-Voting Future Aspects 22
Table of Content

Page No.
Certificate 2
Acknowledgement 3
Abstract 4
Abbreviations 5
Table of Figures
Introduction 8
Existing System 9
▪ Manual Voting
▪ Electronic Voting Systems 10
Proposed System 11
▪ Mobile Voting Systems
▪ Most Prominent Mobile Voting Systems 12
▪ M-Voting System Description 15
A. Requirements analysis
B. Voting operation details using M-Voting 16
• M-Voting Security Mechanism 17
• Technology and Tools used in the project 18
Advantages of M-Voting 19
Disadvantages of M-Voting 20
Conclusion 21
Future Aspects of M-Voting 22
References 23
Introduction

When we look at the problems that leaders have inflicted on many nations of the world, we note that those leaders
either came to power illegally or became monarchs by right of succession. In fact, both have a negative impact in
terms of oppression, injustice, and tyranny. To gain the leadership illegally, all that is needed is to rig the official
elections, which has happened in many countries. The aim of those who would manipulate the electoral process is to
exploit the gaps and vulnerabilities they find, so that their candidate will have the opportunity to meet their
demands, whether they be political or economic. Specialists are always thinking about ways to eliminate, or at least
reduce, the risk of vote manipulation during an election, and about techniques to replace paper-based voting to
minimize the risk inherent in such a voting process. Later, electronic voting systems emerged, in which an attempt
was made to achieve a high level of integrity, but the risk remained.

In this report, we attempt to facilitate, and ensure, the integrity of elections by introducing our M-Voting system,
which is capable of performing tasks that can reduce the risk inherent in the voting process, such as the addition,
deletion, and alteration of votes. Requirements are gathered and composed based on a list of questions asked of a
specific category of people who have participated in elections and election officials, and on other electronic voting
systems, in order to acquire precise ideas regarding their experience and to avoid their mistakes. This system is
designed to accept only one vote from the voter, check on his/her eligibility, and prevent any attempt to manipulate
the vote. It is possible to perform all these operations with nothing more than a mobile phone and an Internet
connection.
Existing System

Manual Voting

Ballot System

Manual voting was the first voting method, and is the oldest, having been used for many centuries. In spite of its
shortcomings, it was considered the only way to vote, as there was no successful alternative. Basically, this system
relies on the voter, whose main role is casting his/her vote for one candidate, either by selecting his/her name on a
preprinted ballot containing the candidates’ names, or by writing the selected candidate’s name on a blank ballot and
placing it in a sealed envelope. After voting is finished, a committee at the polling station, composed of more than
one person, opens the envelopes and places them in piles, one for each candidate. Then, the counting process begins
for all the candidates and the result is recorded. The tabulation process is repeated to ensure that the results are
identical. If they are not the same, they have to be tabulated a third time, and so on, until there are no discrepancies.
Eventually, the results are certified and transmitted to the tabulation center for the announcement of the final result.
However, the traditional methods, with all their diversity in terms of the means of voting, are still problematic. As
mentioned before, since the votes are gathered and counted by hand, there is a strong likelihood of the occurrence of
errors.
Electronic Voting Systems

Electronic Voting Machine

Elections permit the population to select their representatives and convey their preference for who will govern them.
Obviously, the honesty of the election process is essential to the truthfulness of democracy itself. The voting system
should be reliable enough to resist to many suspicious behaviors, and at the same time adequately translucent and
lucid that citizens and nominees can accept the results of an election. Not surprisingly, history is cluttered with cases
of elections being misused to control their result. For this reason, many researchers, professors, and developers
began to think about ways to enhance the integrity of the election process. They established working teams to study
many instances of traditional elections and the results of those elections, and came up with the concept of e-voting,
which is an electronic technology and not necessarily related to traditional methods. E-voting is a common type of
polling, whereby electronic systems multiple mechanisms are used, such as optical vote scanning systems and voting
kiosks, as well as punched cards, and involve the transmission of ballots and votes via telephone, the Internet, or
private computer networks.
Proposed System

Mobile Voting Systems

Today, mobile smart phones, connected to Internet, are considered one of the necessities of life and are highly
reliable as an alternative to hard-wired phones and to computers, because they are small size and easy to own.
Previously, password protection was difficult to break, and was a highly reliable means of safeguarding online
accounts. However, but now there are numerous free programs that can be downloaded and used to break
passwords, which do not require sophisticated technical skills, so that anyone with a modicum of experience can run
them to steal online account information. To find solutions to such problems, biometrics are developed to determine
and examine uniqueness of the human being body, such as fingerprints, eye retinas and irises, DNA, voice patterns,
facial patterns, and hand measurements. This approach can provide optimal reliability, in terms of determining the
identities of users for authentication purposes, as it is impossible for two any individuals, even twins, to have the
same body structure. Biometrics are a vast improvement over passwords, the principal weakness of which is that
they can be forgotten. Moreover, many people use the same password for all their accounts, and so when an attacker
gains access to one account, he/she can very often succeed in accessing the rest with the same password.

However, according to Microsoft, “Biometrics are often computationally intensive to compute, inaccurate, and
unable to scale to identify an individual among a large set of known individuals.” “Therefore,” argues Microsoft,
“the biometric identification of an individual may be supplemented by identifying one or more devices associated
with the individual. When an individual is registered for identification, various device identifiers of devices
associated with the individual may be stored along with the biometrics of the individual. Individuals may then be
identified using both biometrics and detected device identifiers, thereby improving the efficiency, speed, accuracy,
and scalability of the identification.”

There are a great many fingerprint scanning applications that permit the user to lock and unlock his/her device.
Basically, the lock process is carried out through a fingerprint screen that pops up, and the user has to touch that
screen for identity authentication. At that time, a vibration is felt and a beep is heard which persist to the end of
scanning process. The unlock process is different, in that it is based on the user touching the screen until the
fingerprint is authenticated, rather than on scanning or storing the data. It is important to mention that this software
doesn’t constitute a true biometric application, which does scan the fingerprint, but is an imitation of that software.
Android devices have taken the lead in the development of biometric scanning applications. The Android device
competitor, Apple, is in the process of patenting its biometric scanning products, which may include a voice
recognition system, a retinal scanner that uses the iPhone's camera, or, most likely, a screen to scan fingerprints.
According to Robinson, “Motorola has been heavily marketing the security benefits of using biometrics (fingerprint
sensor) to protect its latest Android smart phone, the Atrix. It is even being called the ‘James Bond’ smart phone”.

According to the Joint EC-UNDP Task Force, there is strong interest on the part of African countries such as Benin,
Malawi, Zambia, Tanzania, Togo, Mauritania, Ivory Coast, DRC, and Nigeria in the procurement of high-tech
biometric voter registration systems, which need to gather data via what are referred to as “mobile biometric or ID
registration kits”. Clarke and Furnell have compared various biometric techniques for mobile phones. They found
that fingerprint recognition is the most suitable authentication technique for mobile phone users.

COMPARISON OF VARIOUS BIOMETRIC TECHNIQUES FOR MOBILE PHONES:

Biometric technique User preference Accuracy


Facial recognition Medium High
Fingerprint recognition High Very high
Hand geometry Medium Very high
Handwriting recognition NA Medium
Iris scanning Medium Very high
Keystroke analysis Low Medium
Service utilization NA Low
Voiceprint verification High High

“The user preference is investigated in a survey. The assigned accuracy category is based upon reports by the
International Biometric Group and National Physical Laboratory.”
Most Prominent Mobile Voting Systems

The mobile-based voting system is a solution to increase voters’ participation in the election operation since the
mobile phone acts as the polling booth. However, the mobile phone is not designed to accommodate large
computation schemes. This is why the GSM mobile voting scheme was developed, based on the blind signature, the
digital signature, and bit commitment. This method has the ability to handle large scale elections, as well as the
largest possible number of voters. Among the many achievements in this field, the most prominent are the
following:

In 2011, the Mobile Voting System was introduced by Radovan Murin. This is an open source android application
developed for election purposes. This system uses two methods:

▪ Method 1 “requires a computer and either a data cable from your device or the ability to read micro SD
cards.”
▪ Method 2 requires an Internet connection. The whole process is performed via SMS. The voter can register
and answer the election questions by sending and receiving SMS messages.

The Mobile Voting System application won the USA Challenge in 2010. “It was developed by New York City
entrepreneur Elliot Klein who has identified a variety of uses for his innovation, ranging from government elections
to stockholder proxies and other authorized response-based processes.”

According to Michael Campbell, senior vice president of sales and marketing for VeriSign Messaging and Mobile
Media “Mobile Voting was No. 1 in a list of five mobile messaging predictions newly released by VeriSign Inc.'s
messaging and mobile media division. The success of the Obama presidential campaign last year using a
combination of television, grassroots, and the Internet with last-mile support from mobile technology is proof of the
channel's potential.” He added: “There has been a new movement toward the acceptability of the mobile.” [13] This
method is based on exchanging SMS messages and has been developed to be used in several fields, such as
elections, banking, and many other services.

The WeVote program, which uses exchangeable SMS messages and send the results to the Web server. This method
requires a GSM modem and a driver, JDK 6, or the latest version, in addition to the WeVote program. The
registration process is conducted via SMS, and includes basic information about the voter, such as age/birthday and
gender, which would be stored in the database.
Consequently, with M-Voting, we concentrate on one dimension of biometric technology, which is fingerprint
authentication. VeriFinger Embedded is used in this project to prove the effectiveness of using such a tool in this
application. Neurotechnology, the Biotech specialist, has developed and released applications that support
fingerprint or facial recognition, or both. These three releases are called VeriFinger Embedded, VeriLook
Embedded, and MegaMatcher Embedded respectively. They can be downloaded and run on mobile devices that
support the Android OS, such as smart phones, tablets, and handheld computers. VeriFinger Embedded is also
supported by a range of popular fingerprint scanners and readers, ensuring fingerprint capture in less than 1 second
in a device with a 1 GHz processor or better. For the proof of concept, we developed our own database, and then,
during the implementation phase, we produced a demo to test the application for efficiency and errors. A small
number of university staff members and students participated in the test process. They registered in the system by
providing the necessary information, such as their national ID number and their fingerprint, which read and stored in
the database. Then, if the voter wishes to elect a candidate, he/she has to log in to the system by providing his/her
number and fingerprint, which compared to those in the database. If they are identical, access will be granted.
Otherwise an error message is displayed, stating that no such information exists in the database.

M-VOTING SYSTEM DESCRIPTION

A. Requirements analysis

The analysis phase was conducted based on three methods of gathering requirements for our M-Voting
system. We called on the knowledge of people who had already participated in the election process. We
also elicited requirements elicited from qualified people in this domain who are election officers who
manage the voting process. In addition, because of the widespread use of many different electronic voting
systems, we were able to gather information based on the methodology and requirements implemented by
those systems. As a result, we benefited from the experience of their users, both positive and negative. This
information also helps us to avoid mistakes that have been made in the past.

The use case diagram below figure illustrates the functionality of M-Voting in terms how the system
performs, and includes stakeholders involved, such as the voter and the administrators. M-Voting’s most
important nonfunctional requirements are: security, performance, usability, availability, and reliability.
B. Voting operation details using M-Voting

consideration after the problems of the Manual Voting System and the E-Voting System had been described,
which are:

▪ the M-Voting client


▪ the M-Voting server

The client of M-Voting is the mobile phone. The registration process determines the identity of the voters. If
their identity is authenticated, the voters are allowed to exercise their responsibility to participate in elections.
This process is performed manually in most countries, and automatically or semi-automatically in other
countries, to verify voter identity. There are techniques available that facilitate the registration process to ensure
the identity of voters, and that each voter votes only once, using voters’ digital information. One of these is a
database, on the server side, that stores and records the required data. The second technique is one of the best
known and most widely publicized biometrics, fingerprint recognition. Because of their uniqueness and
consistency, fingerprints have been used for identification for over a century.

“Today, identification can be achieved in a few seconds with reasonable accuracy. As a result, the use of
automated fingerprint identification systems (AFIS) that record, store, search, match and identify finger prints is
rapidly expanding. AFIS can be integrated in a suite of applications that work together to provide
comprehensive fingerprint and palm print identification solutions to accommodate the needs of voter
registration systems, as well as voter authentication and voter identification systems used at voting time.”

In a production scenario, M-Voting server side has a database, which is connected to the government identity
authority server to check the voter’s identity. If the person is 18 or over and wishes to participate in the election
process and elect a candidate, he must participate in the registration process. Through M-Voting, the voter
provides information such as his/her national ID number and fingerprint. Then, this information is transmitted
directly to the government server to verify the identity and age of the voter. If the information entered by the
voter conforms with the information in the government database, the voter information is recorded on the
system database server. The registration process is now complete, and he/she can participate in the voting
process. Otherwise an error message is displayed, stating that there is no such information in the database.
Later, if the voter wishes to modify his information, he/she has the ability to do that, but without the authority to
change the vote.
C. M-Voting Security Mechanism

Of the many objectives associated with information security systems; privacy or confidentiality, data integrity
and authentication are the framework objectives, and the remaining ones can be derived from these. The
Advanced Encryption Standard (AES) is an approved algorithm which uses a 128/192/256 bit key to generate
cipher text. This is one of the strongest encryption algorithms available, and has been evaluated on software as
well as hardware platforms, like FPGAs and ASICs. It has been found that the mix-column in encryption and
inverse mix-column in decryption are most computational and hence consumes large amount of clock period
time. This reduces the throughput and also increases the dynamic power consumption.

Every voter registered and identified by the Election Authority will be able to use a secure messaging service
between the client mobile and the server. A 128-bit AES will be used on the client side as well as on the server
side, and all the messages sent or received would be encrypted. This feature would be in addition to the other
identification procedures that use biometric security systems. The primary concern in this part of the design is
the key distribution. The key is to be initiated only when the election is announced and the voters are contacted
to register for the current election process. The first level of registration is more generic, in the sense that the
biometric fingerprint information, personal details, and unique identification numbers are stored in the database,
so that the information stays with the authority for a long period of time. The second level of registration initiates
the election procedure itself, verifying the mobile phone connection with the system and initiating the encryption
and decryption key between the server and the client. The advantage of this kind of two-tier system is that a new
key is generated every time an election is held and can be used only within a specified period of time. The key
expires under these conditions:

▪ when the session period within which the voter is expected to vote is over.
▪ when the voter has cast his ballot.
▪ when the voter’s information, either biometric or mobile verification, has failed.

Breaking the AES 128 keys using cryptographic analysis requires some time, perhaps days. The authors have
found no evidence in the literature that this can be done fraudulently in a short period of time. As a result, a
specified time during which the key is valid strengthens our system considerably.

The sequence of actions performed in the election process, using M-Voting, is as follows:

i. Voter registration: Personal details and biometric information, like the fingerprints of all fingers of the voter, are
collected.

ii. Voter validation: The authenticity of the voter’s credentials submitted during registration is verified at the
government identity authority server.

iii. M-Voting system activation: When an election date is announced, a message to that effect is sent to registered
voters.

iv. Voter response: The voters are expected to respond to the M-Voting activation message, to enable mobile phone
identification and verification by the servers.

v. M-Voting activation code sent: The M-Voting server sends an encrypted message containing the activation code
and the key. This message can be decrypted at the client’s mobile using the code and the International Mobile
Equipment Identity number of the mobile phone.

vi. Voting period set: The period during which voting can take place is announced.

vii. Key retrieval by the mobile phone: The ballot can be cast by the voter during the specified voting session.

viii. Valid vote message sent: Once the vote has been declared valid, the M-Voting system deactivates the key and
the voter is notified that he/she has voted successfully.
ix. M-Voting system reminder: If a vote has not been cast within the specified session period, the message is resent,
to give the voter the opportunity to cast his/her ballot.

x. Steps (iii) to (viii) are repeated if the voter in Step ix wishes to cast his/her ballot.

D. Technology and Tools used in the project

Technology tools are considered an important factor, helping engineers design and implement any system, whether
it is a Web-based or mobile application. Naturally, drawing tools vary widely, and in this project only certain kinds
of tools have been selected which are characterized by strength and excellent performance. Furthermore,
implementation tools for mobile applications that support the Android OS have also been mentioned, which are
used in the implementation phase. The main technologies we use are the following: OpenProj, Smart Draw,
Android SDK, MS Visio 2007, ArgoUML, PHP Programming Language, Adobe Photoshop CS, Microsoft SQL
Server Management Studio 2005, MySQL Database, and Apache Web Server.
Advantages of M-Voting

▪ Voting without borders: This application makes the voting process much easier, since the voter does not
need to reside in the country of which he is a citizen. Simply by providing his national ID number and
fingerprint, he will be able to take part in the election process.

▪ Voting only once: After the voter casts his vote, there is no opportunity to manipulate that vote, since the
mobile phone number, ID, and fingerprint are recorded in the database, so the voter will be blocked
should he/she attempt to vote for a second time.

▪ Choice Consideration: The voting process is conducted using mobile phones equipped with touch
screens. Under normal circumstances, the touch that gets 50% or more of the pixels is taken as the voter’s
choice. If the voter confirms that selection, it is considered to be the voter’s choice.

▪ An automated counting process: This process is implemented on the database side, which resides on the
election authority’s server, and so it will be much faster and more accurate than manual voting.

▪ Nomination of a party candidate: If an individual wishes to nominate himself/herself for election, he/she
sends a request to the election authority for approval. Once his request has been approved, the
administrator will check whether or not his name is on the list of candidates. If not, the administrator will
add him to the list of candidates.

▪ Appointment of an administrator: The election authority, nominates an Admin for M-Voting who is
responsible for managing electoral districts, and assigning system’s tasks and privileges to election
authority staff. He also manages candidates, parties, and voters on the system.

▪ Election authority: This body is responsible for organizing national elections and referenda. Also, they
can monitor and control the voting process through a secure website, but without being able to manipulate
the results. Furthermore, they are responsible for announcing the winning candidate. Moreover, there is a
log file on the server to record every transaction that occurs, such as where the users (administrators and
election authority staff) come from, how often they return to the site and how they navigate through it.
Disadvantages of M-Voting

1) Environmental factors: These may be internal or external to the organization:

a) Internal: Perhaps the most common problems are the lack of skill in administrating biometric voter
registration and staff resistance to change.

b) External: Political leaders may not be interested in the registration process and its accuracy and integrity.
Vendors may gain access to a system and corrupt its ability to correctly tally votes or to manipulate the
electorate, motivated by money or power.

2) Technical factors: Many machines have been developed recently with as variety of speeds and levels of
efficiency and reliability that can cause delays and failures. Changes in biometric characteristics, such as voices
altering with age and fingerprints altering due to skin scratches or the kind of work carried by individuals, can
affect the mobile voting process.
Conclusion

Throughout the long history of the democratic process, and with the progress of time and changes in people’s needs,
the election is a powerful tool for peacefully resolving conflicts, whether political, religious, or economic, based on
the will of the majority. As such, an election leads to a period of transition in any country. Security, integrity, and
availability form the cornerstone of any voting process, and the nature of that process can affect both the actual and
perceived legitimacy of electoral outcomes. During the development of our M-Voting system, the previous
experience of the participants in the field of manual and electronic voting systems was considered, as were the
vulnerabilities and weaknesses of the manual and e-voting systems in use today. M-Voting is designed to improve
on current voting processes by allowing voters to cast their ballot via mobile phones, streamline the registration
process by requiring simply the voter’s national ID number to check his/her eligibility and scanned fingerprint to
ensure integrity, eliminate vote tampering, and increase voter confidence in the voting process. The results show that
M-Voting is a secured mobile application that increases the accuracy and efficiency of the voting process. In fact, it
accommodates very large numbers of voters, since the process doesn't require a great deal of effort and it can be
completed quickly. Finally, with more enhancements and publicity, M-Voting could be an ideal solution for voting,
it is a method that demands integrity on the part of both nation and government.
Future Aspects of M-Voting

M-Voting provides the ability to conduct the voting process without the direct intervention of polling stations, as
simply as possible, and voters can cast their votes via a mobile phone. This system is characterized by its
effectiveness, high usability, accuracy, and rapidity. With its contribution to a fair and accurate election process, will
constitute a successful step toward achieving democracy. Also, it removes all the obstacles that have been
encountered in the past, in the era of manual and electronic voting processes. It can be considered as a turning point
in the political, social, and economic areas of state policy, with its multi-factor authentication solution.

Moreover, little or no resistance to change is expected with the implementation of this system, as no particular skills
are required to administer the biometric voter registration process. There is no possibility that vendors will gain
access to the system and corrupt its ability to correctly tally votes or manipulate the results for money or power,
since M-Voting runs a dedicated strong security algorithm. Moreover, since a fingerprint can be captured by anyone,
there is no concern about the concept that forbids or restricts physical contact with a member of the opposite gender
(except spouse, children, siblings, grandchildren, parents, and grandparents).

Changes in biometric characteristics, such as a fingerprint being altered by a scratch or by a work-related change is
not an issue for M-Voting, since the voter will have scanned all his/her fingers during registration. Furthermore, no
new equipment or systems is needed to achieve the required standards and to facilitate the voting process.

Finally, M-Voting is being developed for many uses, varying from students’ representative selection to government
elections and other formal response-based procedures.
References

[1] Joint EC-UNDP Task Force. (2012, April 17). Biometric Voter Registration: Skills required and problems
encountered? Retrieved August 16, 2012, from Aceproject Web site: http://aceproject.org/
[2] Schneier B. (2004, November 10). The Problem with Electronic Voting Machines. Retrieved from Schneier
website: http://www.schneier.com/blog/archives/2004/11/the_problem_wit.html
[3] Costa K. (2012). Jettisons e-voting for 2012 polls. Retrieved from Allvoices website:
http://www.allvoices.com/news/8863658-ghanagovt-jettisons-evoting-for-2012-polls
[4] Bismark, D. (2004, November 5). 85% of electronic voting projects failed in developing countries. Retrieved
from Ted website: http://www.ted.com/talks/david_bismark_e_voting_without_fraud.html
[5] Mercuri R. (2010, September 1). E-voting. Retrieved from Notablesoftware
http://www.notablesoftware.com/evote.html#Statement
[6] Nir N, Veradim K, Eyal K, and Shimshit. (2012, June). Patent of the Month in the Biometry Field. Retrieved
July 28, 2012, from Planet Biometrics: http://www.planetbiometrics.com/creo_files/upload/articlefiles/
patent_of_the_month_-_july_2012.pdf
[7] Robinson, R. (2011, October 24). Growth Expected from Mobile Phone Biometric Security Market. Retrieved
August 14, 2012, from Card Guide International website: http://www.card-
guideinternational.com/201110241732/Growth-Expected-from-Mobile-Phone-Biometric-Security-
Market.html?print=1&tmpl=component
[8] Goode Intellignece. (2005). Market for mobile phone biometric security
products and services set to grow and will generate over $161 million revenue by 2015. Retrieved from
http://www.goodeintelligence.com/media/media_centre/1309411147mobile_phone_biometric_security_final_news_
release_300611.pdf
[9] Clarke, and Furnell. (2005). Biometrics on the mobile phone. Retrieved from
http://www.intechopen.com/books/recent-application-inbiometrics/biometrics-on-mobile-phone
[10] Wang, S. and Liu, J. (2010). Biometrics on the mobile phone. Retrieved July 28, 2012, from
http://www.intechopen.com/books/recentapplication-in-biometrics/biometrics-on-mobile-phone
[11] Murin, R. (2011). Mobile voting system Quick Start and Tutorial. Retrieved 16-08-2012, from
http://code.google.com/p/mobile-
votingsystem/downloads/detail?name=Mobile%20voting%20system%20Quick%20Start%20-%20EN.pdf
[12] Gibbons, G. (2010, October 18). Mobile Voting Application Wins USA Challenge. Retrieved August 16, 2012,
from Insidegnss website: http://www.insidegnss.com/node/2343
[13] Khan, M. A. (2009, April 6). Mobile voting could become reality by 2012: VeriSign. Retrieved August 16,
2012, from Mobile Marketer Website: http://www.mobilemarketer.com/cms/news/messaging/2980.html
[14] Pavlo, B. and Ekimov, V. (2010, November 4). wevote - Mobile Voting System. Retrieved August 16, 2012,
from http://code.google.com/p/wevote/
[15] A Menezesm, P Van Oorschot, and S Vanstone, Handbook of Applied Cryptogoraphy, CRC Press 1996.

You might also like