A blockchain-enabled online-voting system is being proposed in this following paper. Blockchain technologies deliver an endless variety of applications that benefit from distributed economies. The proposed model is an android application that has enhanced security features which includes both authentication and authorization. Authentication is incorporated by using a unique identification key and authorization is done by using fingerprint. Voters are also being verified by One-time password. The security in this project is implemented by using a 128 bit AES encryption algorithm and SHA-256 along with blockchain. The vote is casted in the form of transaction, where a blockchain is created, which keeps track of tallies of votes. Through this atomicity and integrity are maintained. [4]
Index Terms—Voting System , Blockchain , SHA-256, Security, AES-128, Ballot
In today's global world every organization or enterprise, storing their essential data in terms of Databases and shares their data to authenticated users on the web through some security mechanisms. But now-a-days security is a big issue because of various types of database attacks. SQL injection is one type of such an attacks that inoculate a destructive SQL code to misuse database of an application. In this paper, we did experimental analysis on web-database applications as well as purely database applications and presented prevention guidelines of SQL injection attacks.
Coronavirus has affected China massively. This creates dread among the peoples in the world. Cyber criminals tend to take advantage of fear through malicious activities. Cyber criminals generate a phishing and spam campaign to trick the people in the name of Coronavirus. According to current analysis, the criminals hide malware behind different documents that are shared for creating awareness for the people regarding Coronavirus. Kaspersky technologies discovered that such documents contain viruses, trojans, worms, etc. (malwares) that can infect other files on victims' systems and corrupt or encrypt them. In this chapter, the nature, behavior, and types of different malware and their impacts are analyzed. An analysis is performed on how attackers' attacks using that malware to misuse the victim's data and what the techniques used to perform the attack are. In this chapter, an experimental analysis is performed to detect these attacks, and also measures and guidelines are proposed to prevent these types of attacks.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.