Pali et al., 2020 - Google Patents
A comprehensive survey of aadhar and security issuesPali et al., 2020
View PDF- Document ID
- 3286378329452875825
- Author
- Pali I
- Krishania L
- Chadha D
- Kandar A
- Varshney G
- Shukla S
- Publication year
- Publication venue
- arXiv preprint arXiv:2007.09409
External Links
Snippet
The concept of Aadhaar came with the need for a unique identity for every individual. To implement this, the Indian government created the authority UIDAI to distribute and generate user identities for every individual based on their demographic and biometric data. After the …
- 238000000034 method 0 abstract description 19
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10887098B2 (en) | System for digital identity authentication and methods of use | |
US11044087B2 (en) | System for digital identity authentication and methods of use | |
RU2747947C2 (en) | Systems and methods of personal identification and verification | |
US11095646B2 (en) | Method and system for data security within independent computer systems and digital networks | |
Agrawal et al. | Privacy and security of Aadhaar: a computer science perspective | |
CN109417549A (en) | The method and apparatus of information proof is provided using centralization or distributed ledger | |
US11503026B2 (en) | Email address with identity string and methods of use | |
Abuidris et al. | Risks and opportunities of blockchain based on e-voting systems | |
Panait et al. | Identity Management on Blockchain--Privacy and Security Aspects | |
Pali et al. | A comprehensive survey of aadhar and security issues | |
Ghafourian et al. | Combining blockchain and biometrics: A survey on technical aspects and a first legal analysis | |
Fan et al. | A privacy preserving e-voting system based on blockchain | |
Kamboj et al. | An exploratory analysis of blockchain: applications, security, and related issues | |
Al-Rawy et al. | A design for blockchain-based digital voting system | |
Salman et al. | Security Attacks on E-Voting System Using Blockchain | |
Sadhya et al. | A critical survey of the security and privacy aspects of the Aadhaar framework | |
Sharma et al. | A survey on blockchain deployment for biometric systems | |
Rani et al. | A block chain-based approach using proof of continuous work consensus algorithm to secure the educational records | |
García et al. | Digital onboarding in finance: a novel model and related cybersecurity risks | |
Poonguzhali et al. | Securing Aadhaar details using blockchain | |
BRĂCĂCESCU et al. | A PROPOSAL OF DIGITAL IDENTITY MANAGEMENT USING BLOCKCHAIN | |
Mullegowda et al. | A novel smart contract based blockchain with sidechain for electronic voting. | |
Solanki et al. | Proposed Secure and Robust Voting System Using Blockchain Conceptual Framework | |
Savitha et al. | Blockchain-based online voting system | |
Ndungu | An E-voting System Based On Blockchain Technology:(A Case Study Kenya Elections) |