Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: Aadhaar.

Artykuły w czasopismach na temat „Aadhaar”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Aadhaar”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.

1

P.J, Sankaranarayanan, i Geogen George. "Blockchain Based Aadhaar Security". International Journal of Engineering & Technology 7, nr 4.6 (25.09.2018): 398. http://dx.doi.org/10.14419/ijet.v7i4.6.28450.

Pełny tekst źródła
Streszczenie:
A blockchain is a decentralized, disseminated and digital ledger that can’t be altered retroactively without modifying every single blocks and the consensus of the network. Blockchain can be used in smart contracts, Banks, IoT devices, Database management, etc., Due to recent times flaws and leakage of Aadhaar information (Aadhaar which is the largest government databases of the Indian citizens) in Internet the security and privacy of Aadhaar became questionable. In order to ensure the security of Aadhaar, Blockchain has the potential to overcome security and privacy challenges in Aadhaar. In this project we are going to create a Blockchain for Aadhaar database and implement light weight algorithm for efficiency, optimization and scalability along with the Blockchain securing algorithm.
Style APA, Harvard, Vancouver, ISO itp.
2

Raaju. "PERCEPTION OF PEOPLE ON AADHAAR (LINKAGE, USAGE & VOTING) A CASE STUDY (2014-16) WITH REFERENCE TO CHITTOOR DISTRICT AP, INDIA". International Journal of Research -GRANTHAALAYAH 5, nr 7 (31.07.2017): 450–60. http://dx.doi.org/10.29121/granthaalayah.v5.i7.2017.2153.

Pełny tekst źródła
Streszczenie:
This article is a survey done to know how the people linked their aadhaar number to the voter id, gas cylinder, fee reimbursement, Bank account, House & Water tax, Birth Certificate, Admission in a School, RTO license, Raitu Runa Mafi, Employer data, Income/Caste/ Nativity. This article also collected the information on how is the usage of aadhaar as a proof of identity and the people voting on continue the aadhaar and linking of aadhaar.
Style APA, Harvard, Vancouver, ISO itp.
3

Sharmin, Kamila I. "AADHAAR ENABLED PAYMENT SYSTEM – A NEW INNOVATION TO DIGITAL PAYMENTS OF INDIA". International Journal of Research -GRANTHAALAYAH 8, nr 4 (29.04.2020): 67–71. http://dx.doi.org/10.29121/granthaalayah.v8.i4.2020.8.

Pełny tekst źródła
Streszczenie:
Aadhaar enabled payment system (AEPS) is a type of payment system that is based on the unique identification number and allows Aadhaar card holder seamlessly make financial transaction through Aadhaar based authentication. The AEPS framework expects to enable all the areas of society by making monetary and banking administrations accessible to all the Aadhaar. AEPS is context through one can make fund transfer, make disbursement, make cash deposit, make extractions, make request for information about bank balance etc.
Style APA, Harvard, Vancouver, ISO itp.
4

Cohen, Lawrence. "India as database: Response to Reetika Khera". Contributions to Indian Sociology 53, nr 2 (2.05.2019): 328–40. http://dx.doi.org/10.1177/0069966719838323.

Pełny tekst źródła
Streszczenie:
If sociology is ‘missing’ from the Aadhaar debate, to take Reetika Khera’s provocation seriously, the absence may reflect a disciplinary reluctance to accede to normative terms of contest in which the biometric identity platform must be rendered as boon or blight. Though a refusal of such normative formulations may be necessary, it carries its own ethical limit. Beyond the question of normative assessment, Aadhaar raises multiple additional questions. Several are noted here, questions on Aadhaar as regime of de-duplication; on database as emergent social imaginary; on the immateriality of Aadhaar; and on the collapse of welfare, wage, credit and product into ‘service’ as the emergent form of value.
Style APA, Harvard, Vancouver, ISO itp.
5

Khera, Reetika. "The Aadhaar debate". Contributions to Indian Sociology 52, nr 3 (14.09.2018): 336–42. http://dx.doi.org/10.1177/0069966718787029.

Pełny tekst źródła
Streszczenie:
The Aadhaar project which aims to provide all residents in India with a unique identity number requires much more attention from sociologists of India. There are several areas of research where sociologists can help: one, the implications of new technologies of surveillance for (a) privacy and (b) society; two, the repercussions of the desire for social ordering and control and technocratic solutionism for people in their interactions with the state demands fuller sociological study. This brief note attempts to outline some of the issues that call out for enquiry.
Style APA, Harvard, Vancouver, ISO itp.
6

Naved, Z. Zakhar, i Isha Kaushal. "Aadhaar: Its Implementation and Implications". Christ University Law Journal 8, nr 1 (1.01.2019): 1–36. http://dx.doi.org/10.12728/culj.14.1.

Pełny tekst źródła
Streszczenie:
In the light of almost every welfare and non-welfare scheme mandating Aadhaar, it becomes imperative to consider its inevitable implications. The Aadhaar, which was initially conceived for the benefit of BPL families, has been for over a decade forced upon every resident of India. The Supreme Court, in its judgement, while assenting Aadhaar, has adequately addressed the apprehension of the petitioners by striking off or reading down the impugned provisions which invariably set a new legislative agenda for the Parliament. Thus, this Paper attempts to analyse the provisions of Aadhaar, and the legal implications emanating there from. Through this paper, the authors will strenuously aver that though UID was initiated with the objective of streamlining the distribution of basic and fundamental services to the weaker sections, it has now turned into an all pervasive tool which has the potential of arming the Government, private corporate players and hackers with sensitive data.
Style APA, Harvard, Vancouver, ISO itp.
7

Chamuah, Angelina. "For a Sociology of Aadhaar". Contributions to Indian Sociology 52, nr 3 (14.09.2018): 343–47. http://dx.doi.org/10.1177/0069966718787030.

Pełny tekst źródła
Streszczenie:
This companion piece to Reetika Khera’s account above is an attempt to situate some of the key aspects of the Aadhaar debate within a sociological field of enquiry, looking into just how and in what ways a sociologist might contribute to the study of India’s Aadhaar.
Style APA, Harvard, Vancouver, ISO itp.
8

Rao, Ursula, i Vijayanka Nair. "Aadhaar: Governing with Biometrics". South Asia: Journal of South Asian Studies 42, nr 3 (4.05.2019): 469–81. http://dx.doi.org/10.1080/00856401.2019.1595343.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Banerjee, Subhashis, i Subodh Sharma. "Privacy concerns with Aadhaar". Communications of the ACM 62, nr 11 (24.10.2019): 80. http://dx.doi.org/10.1145/3353770.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Rao, Ursula. "Response to ‘The Aadhaar debate: Where are the sociologists?’". Contributions to Indian Sociology 53, nr 3 (4.08.2019): 431–40. http://dx.doi.org/10.1177/0069966719861759.

Pełny tekst źródła
Streszczenie:
At this historical juncture, when digital governance is fundamentally re-forming social relations, we need critical knowledge about the emerging texture of society. This text responds to Reetika Khera’s important intervention about the need for more timely studies of Aadhaar. Building on Angelia Chamuah’s and Lawrence Cohen’s comments, I argue for the need to ask broader questions about the changing character of the political as it emerges in the Aadhaar arena. Today, states respond to the world’s dizzying complexity by inventing new experimental solutions, many of which utilise digital technologies, and often rather than deliver solutions, create new pathways for learning through critical engagement. Aadhaar is a case in point. In their studies, scholars should remain attuned to the open-endedness of the Aadhaar infrastructure and understand its experimental ethos. This would generate knowledge about processes of iterative learning and lead to conclusions about the role of feedback-loops for the evolution of digital governance. From there one can conclude about systems of value, social hierarchy, or justice and fairness that organise the processes of adapting a new infrastructure to multiple social contexts.
Style APA, Harvard, Vancouver, ISO itp.
11

Yadav, Vanita. "Technology-Enabled Inclusive Innovation". International Journal of Innovation in the Digital Economy 7, nr 1 (styczeń 2016): 1–11. http://dx.doi.org/10.4018/ijide.2016010101.

Pełny tekst źródła
Streszczenie:
India is a country with a population of 1.2 billion and around 400 million poor people remain excluded from the formal economy. India does not offer a social security number for its residents. Rather, there exist variant forms of identification documents. In 2009, the Government of Indian initiated the Aadhaar project to create biometric technology enabled unique identities for Indian residents. In a short 8-year span, the project has made remarkable progress by enrolling more than 600 million people. The objective of this paper is twofold- (i) to review the emerging literature on inclusive innovation and (ii) to examine the case of Aadhaar Project in India from the perspective of inclusive innovation. Findings of the study reveal that the Aadhaar project has the potential to create an ecosystem of inclusive innovation and entrepreneurship, which can be beneficial for developing economies like India.
Style APA, Harvard, Vancouver, ISO itp.
12

Chavan, Kiran. "Implementation of Aadhaar Based EVM". International Journal for Research in Applied Science and Engineering Technology 6, nr 5 (31.05.2018): 2885–89. http://dx.doi.org/10.22214/ijraset.2018.5472.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
13

Panwar, Avnish. "Fingerprint Identification Using FPGA with a Newly Designed Architecture". Turkish Journal of Computer and Mathematics Education (TURCOMAT) 9, nr 3 (17.12.2018): 1212–19. http://dx.doi.org/10.17762/turcomat.v9i3.13913.

Pełny tekst źródła
Streszczenie:
The Aadhaar project was recently introduced by the Unique Identification Authority of India (UIDAI) to provide a Unique Identification (UID) number to every resident of India. Biometric and demographic information are used to create a unique identification number (Aadhaar). You may use your Aadhaar number to get a subsidy on LPG cylinders, a driving licence, a PAN card and a bank account. The software industry is crucial to the success of the Aadhaar system. The suggested work, including the pre-processing stage, fingerprint recognition process, and fingerprint recognition system, is carried out across three platforms, including MATLAB, field programmable gate array (FPGA), and application specific integrated circuit (ASIC). In order to improve the processing speed, resource utilisation, power consumption, and recognition rate of the proposed job, the FPGA is programmed with two specialised hardware methods: the CORDIC algorithm and IP cores. The suggested work largely focuses on fixing the processing time and accuracy issues. The concept is converted into an ASIC using FPGA technology with the goal of reducing power consumption and resource utilisation without sacrificing performance. In contrast to FPGA implementation, which makes use of look-up tables (LUTs) and customizable logic blocks (CLBs), ASIC implementation makes use of the basic cells directly. When compared to FPGA design, ASIC development speeds up recognition by 20%.
Style APA, Harvard, Vancouver, ISO itp.
14

S, Kavyashree, i Supreetha M. "FINGERPRINT AND FACE RECOGNITION BASED ATM SYSTEM USING RASPBERRY PI". International Journal of Innovative Research in Advanced Engineering 8, nr 7 (30.07.2021): 190–98. http://dx.doi.org/10.26562/ijirae.2021.v0807.008.

Pełny tekst źródła
Streszczenie:
ATMs (Automatic Teller Machine) are becoming widely used in today's world because they are easy to use and offer convenience. However, today's ATM technology comes with some security risks such as the theft and misuse of cards, the possibility of losing a card, and forgetting PIN numbers. A growing number of frauds committed against automatic teller machines over the last decade motivated us to use biometrics to ensure the accuracy and security of personal identification. In this paper, we describe a biometric fingerprint and face recognition system that can replace ATM cards and PINs. The transaction is successful when fingerprint, OTP, and face match. If the fingerprint does not match, the customer is guided to enter the aadhaar number. Similarly, if face matching fails, the customer is given an option to answer the question. Here aadhaar number and correct answer to the question must be entered correctly to proceed. Aadhaar number entry and question & answer options are mainly provided for those who are unable to access the system because of damage to their physical attributes (finger and face).
Style APA, Harvard, Vancouver, ISO itp.
15

Ghosh, Saibal. "Financial inclusion, biometric identification and mobile: unlocking the JAM trinity". International Journal of Development Issues 16, nr 2 (3.07.2017): 190–213. http://dx.doi.org/10.1108/ijdi-02-2017-0012.

Pełny tekst źródła
Streszczenie:
Purpose The purpose of the paper is to understand the interlinkage with financial inclusion and how it interacts with biometric identification. To investigate this in detail, the authors employ household-level data on India to examine the interlinkage among Prime Minister Jan Dhan Yojana (PMJDY) account, Aadhaar card and mobile telephony. Design/methodology/approach Given the survey data, the authors employ 3 stage least squares (3SLS) methodology to explore the association among these key variables, while controlling for other household, district and economy-wide factors. Findings The findings provide strong evidence of complementarity among these variables, with each tending to reinforce the other. This complementarity is reflected primarily in respect of PMJDY and Aadhaar, but much less so with regard to mobile telephony. Additionally, this complementarity is manifest more prominently in the long run, although it is much less so in the short run. Originality/value To the best of the authors’ knowledge, this is one of the earliest studies for India to systematically examine the Jan-Dhan-Aadhaar-Mobile (JAM) trinity.
Style APA, Harvard, Vancouver, ISO itp.
16

Priscilla, C. Victoria, i T. Devasena. "Aadhaar Identity System using Blockchain Technology". International Journal of Computer Applications 174, nr 26 (18.03.2021): 27–32. http://dx.doi.org/10.5120/ijca2021921188.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
17

Anusha, A. K. R. S. "Privacy and Security Issues in Aadhaar". International Journal for Research in Applied Science and Engineering Technology V, nr VIII (30.08.2017): 2213–17. http://dx.doi.org/10.22214/ijraset.2017.8317.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
18

Raman, Ramanand Kumar. "sadvichaar aur sadvyavahaar ka aadhaar-sanskaar". RESEARCH REVIEW International Journal of Multidisciplinary 5, nr 9 (15.09.2020): 148–49. http://dx.doi.org/10.31305/rrijm.2020.v05.i09.034.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
19

Satpathy, Tathagata. "The Aadhaar: “Evil” Embodied as Law". Health and Technology 7, nr 4 (17.07.2017): 469–87. http://dx.doi.org/10.1007/s12553-017-0203-5.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
20

Sathe, Vijay. "Managing Massive Change: India's Aadhaar, the World's Most Ambitious ID Project (Innovations Case Narrative: Project Aadhaar)". Innovations: Technology, Governance, Globalization 9, nr 1-2 (styczeń 2014): 85–111. http://dx.doi.org/10.1162/inov_a_00204.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
21

Et.al, R. Felista Sugirtha Lizy. "Image Encryption Using RK-RSA Algorithm in Aadhaar Card". Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, nr 3 (10.04.2021): 4683–93. http://dx.doi.org/10.17762/turcomat.v12i3.1887.

Pełny tekst źródła
Streszczenie:
Cryptography is used for secretly sending information. The information or given data is protected by cryptographic technique. The technique is used in Text and images. The technique is supported by a lot of algorithms. RSA is a better encryption technique for smart cards. In this paper, an image in the Aadhaar card is encrypted using the RK-RSA algorithm for better protection and confidentiality. The proposed RK-RSA algorithm is very secure for smart cards and Aadhaar cards. The better performance of the RK-RSA is evaluated based on the Avalanche Effect, Speed, Throughput, and Power Consumption. The improved performance of the RK-RSA algorithm’s experimental results is reported. The mathematical justification supporting the RK-RSA algorithm is also detailed.
Style APA, Harvard, Vancouver, ISO itp.
22

Pati, Rupesh Kumar, Vipin Kumar i Nishtha Jain. "Analysis of Aadhaar: A Project Management Perspective". IIM Kozhikode Society & Management Review 4, nr 2 (lipiec 2015): 124–35. http://dx.doi.org/10.1177/2277975215610687.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
23

Bopparathi, Naresh, Rambabu S i K. ArunaManjusha. "Implementation of electronic voting system using aadhaar". International Journal of Engineering & Technology 7, nr 4 (17.09.2018): 2352. http://dx.doi.org/10.14419/ijet.v7i4.13590.

Pełny tekst źródła
Streszczenie:
The present voting system in India is a time consuming process and not so secured. Our project proposes and implements a simple and secured method of polling vote using aadhaar information. Over a period of time there have been many improvisations in the field of voting which aim at increasing the flexibility, reliability, security, scalability and less time consumption to announce the results. In this system the user has to use his finger print to poll the vote.The fingerprints available in the aadhaar database are used for the candidature verification, which will be stored in the computer through which the further process is carried out. The voter need not carry his/her voter ID to the polling booth. A finger print module is used for accessing fingerprints. Once the user gives the finger print it will be compared with the existing data and if it is a genuine user it will be verified else the user is barred from voting and also if a user attempts to vote for the second time it will not be allowed. Once the voting process is finished the authoritative officer accesses the results immediately using a unique PIN provided to him.
Style APA, Harvard, Vancouver, ISO itp.
24

Anil, Vyom. "Looking for Aadhaar in a Biometric Haystack". Interactions 30, nr 2 (28.02.2023): 52–56. http://dx.doi.org/10.1145/3583081.

Pełny tekst źródła
Streszczenie:
Being watched means much more than being seen. This forum investigates information flows of sensing culled from sources as diverse as temperature check and iris scans to sound and movement sensors across terrains. After Veillance discusses how these systems distribute risk unevenly and shape the lives of populations across the globe. --- Sareeta Amrute, Editor
Style APA, Harvard, Vancouver, ISO itp.
25

Deb, Surajit. "Social Protection Network Across Indian States". Social Change 51, nr 3 (wrzesień 2021): 420–25. http://dx.doi.org/10.1177/00490857211032937.

Pełny tekst źródła
Streszczenie:
This contribution of the Social Change Indicators forms the eleventh part of the series. Over the last three segments, we have been focussing on the social and economic challenges arising out of the COVID-19 pandemic and lockdowns. The topics previously covered were on the themes of vulnerable households across social classes, poverty and migration and living conditions for social distancing. In this part, we highlight the spread of the social protection network in various states of India. Aspects such as the percentage of households having a below poverty line (BPL) card, percentage of households having a health scheme or health insurance, percentage of households having a bank or post office account, Aadhaar card saturation, percentage of families/persons covered under the targetted Public Distribution System, percentage of Aadhaar-seeded ration cards, allocation of work under MGNREGA (Mahatma Gandhi National Rural Employment Guarantee Act) and the number of fair price shops per thousand population in 2021 have been examined. The required data has been collected from the Aadhaar Saturation Report provided by the Unique Identification Authority of India, the Food Grain Bulletin of the Ministry of Consumer Affairs, Food and Public Distribution, Ration Card Dashboard of the National Food Security Act, the public data portal of MGNREGA and the Fourth Round of the National Family Health Survey’s state volumes.
Style APA, Harvard, Vancouver, ISO itp.
26

Shaikh, Nazneen, i RIDDHI Bhavsar. "Aadhaar India- The Most Prominent E Governance Scheme". Global Journal For Research Analysis 3, nr 4 (15.06.2012): 117–18. http://dx.doi.org/10.15373/22778160/apr2014/39.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
27

Mudhol, Arun. "Impact of Aadhaar on Education and Health Sectors". Siddhant- A Journal of Decision Making 15, nr 4 (2015): 264. http://dx.doi.org/10.5958/2231-0657.2015.00029.4.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
28

Gopichandran, Vijayaprasad, Parasuraman Ganeshkumar, Sambit Dash i Aarthy Ramasamy. "Ethical challenges of digital health technologies: Aadhaar, India". Bulletin of the World Health Organization 98, nr 4 (17.01.2019): 277–81. http://dx.doi.org/10.2471/blt.19.237123.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
29

Goel, Anusha. "Jan Dhan- Aadhaar- Mobile Trinity: Issues and Prospects". MUDRA : Journal of Finance and Accounting 8, nr 1 (15.06.2021): 120–37. http://dx.doi.org/10.17492/jpi.mudra.v8i1.812107.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
30

Amrute, Sareeta, Reetika Khera i Adam Willems. "Aadhaar and the creation of barriers to welfare". Interactions 27, nr 6 (2.11.2020): 76–79. http://dx.doi.org/10.1145/3428949.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
31

MUKESH, R. AKILA, M. MEENA, G. SASIREKHA, A. SELVAMEENA i T. TAMILSELVI. "FINGER PRINT BASED VOTING SYSTEM Using Aadhaar Card". Special Issue 5, Special Issue 1 (2019): 365–69. http://dx.doi.org/10.23883/ijrter.conf.20190322.047.aygja.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
32

Singh, Ranjit, i Steven Jackson. "Seeing Like an Infrastructure: Low-resolution Citizens and the Aadhaar Identification Project". Proceedings of the ACM on Human-Computer Interaction 5, CSCW2 (13.10.2021): 1–26. http://dx.doi.org/10.1145/3476056.

Pełny tekst źródła
Streszczenie:
Large-scale data systems play a central role in how state bureaucracies come to know and manage citizens. Such systems are endemically uneven in implementation, producing distributed and exclusionary consequences that are among their most important effects. These systems also operate as infrastructures in the rich and complex sense of the term that has been a core contribution of CSCW to the wider computing and social science fields. Building on James Scott's work on 'seeing like a state', we conceptualize 'seeing like an infrastructure' as a more supple analytic perspective that maps the distributed work and uneven consequences through which designers, bureaucrats, and users (here, citizens) assign or claim representation in the consequential data systems that increasingly shape and define citizenship. Drawing on eighteen months of ethnographic fieldwork into Aadhaar, India's biometrics-based identification project, and studies of infrastructure, marginalization, and citizenship in CSCW and allied fields, we argue that this perspective provides crucial insight into the strategies and mechanisms by which effective access to the basic rights and entitlements of citizenship are granted, claimed, and at times undermined. More specifically, we show how challenges in implementing Aadhaar's three key processes-enrollment, seeding, and authentication-give rise to a spectrum of resolution in which the rights and entitlements of 'high-resolution citizens' are expanded, while those of 'low-resolution citizens' are curtailed.?
Style APA, Harvard, Vancouver, ISO itp.
33

Balamurugan, C. R., K. Ramash Kumar i A. Thirumalai. "Secured smart ATM transaction". International Journal of Reconfigurable and Embedded Systems (IJRES) 8, nr 1 (11.02.2019): 61. http://dx.doi.org/10.11591/ijres.v8.i1.pp61-74.

Pełny tekst źródła
Streszczenie:
<p>The objective of this paper is to reduce the service tax during mobile transactions. To improve the security and to make the process easy and less time consuming this process is rendered with the help of GSM (Global System for Mobile communication), finger print sensors, PIC16F877A microcontroller and aadhaar number.</p>
Style APA, Harvard, Vancouver, ISO itp.
34

T M, Navamani, Tajinder Singh Sondhi i Shivam Ghildiyal. "DigiVoter: Blockchain Secured Digital Voting Platform with Aadhaar ID Verification". ECS Transactions 107, nr 1 (24.04.2022): 7427–40. http://dx.doi.org/10.1149/10701.7427ecst.

Pełny tekst źródła
Streszczenie:
The Election Commission of India has talked about India's Electronic Voting Machines (EVMs) as dependable and impeccable, yet comparable electronic voting machines utilized around the world have shown to experience the ill effects of genuine security issues. This research aims to build a digital voting platform secured with the revolutionary concept of blockchain. A naive implementation of the same using Python for biometric authentication and NodeJs to create the blockchain is presented. It secures the blocks using 512-bit SHA-2 (Secure Hashing Algorithm 2). For authentication of users, the proposed model incorporates the use of biometric data which will be mapped to the cryptic unique Aadhaar card number of the voter. Thus, a platform is proposed to make the voting procedure easier, secured, and fault tolerant using blockchain. The results show secure vote casting by biometric authentication and saving in an immutable distributed fashion, thus keeping it safe from being altered.
Style APA, Harvard, Vancouver, ISO itp.
35

Karpagavani, R., M. Mangai, D. Meena, E. Poonguzhali i Chitravalavan . "Aadhaar Identity Based Electronic Voting Machine With Instant Result Announcement". i-manager's Journal on Embedded Systems 4, nr 3 (15.10.2015): 26–30. http://dx.doi.org/10.26634/jes.4.3.4896.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
36

Bhatia, Amiya, i Jacqueline Bhabha. "India’s Aadhaar scheme and the promise of inclusive social protection". Oxford Development Studies 45, nr 1 (2.01.2017): 64–79. http://dx.doi.org/10.1080/13600818.2016.1263726.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
37

Breckenridge, Keith. "Lineaments of Biopower: The Bureaucratic and Technological Paradoxes of Aadhaar". South Asia: Journal of South Asian Studies 42, nr 3 (4.05.2019): 606–11. http://dx.doi.org/10.1080/00856401.2019.1613080.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
38

Abraham, Itty. "Prehistory of Aadhaar: Body, Law, and Technology as Postcolonial Assemblage". East Asian Science, Technology and Society 12, nr 4 (31.10.2018): 377–92. http://dx.doi.org/10.1215/18752160-7218326.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
39

Sikka, Neha, Sameer Saxena, Kannu Priya i Vanita Suthar. "Momentousness of denture labeling using Aadhaar number in Indian population". Journal of Family Medicine and Primary Care 8, nr 9 (2019): 2760. http://dx.doi.org/10.4103/jfmpc.jfmpc_293_19.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
40

R., Pradeep, N. R. Sunitha i G. S. Thejas. "A Modern Mechanism for Formal Analysis of Biometric Authentication Security Protocol". International Journal of Computer Network and Information Security 15, nr 3 (8.06.2013): 15–29. http://dx.doi.org/10.5815/ijcnis.2023.03.02.

Pełny tekst źródła
Streszczenie:
A Biometric Authentication Security (BAS) protocol is a method by which a person's unique physiological or behavioral characteristics are used to verify their identity. These characteristics can include fingerprints, facial features, voice patterns, and more. Biometric authentication has become increasingly popular in recent years due to its convenience and perceived security benefits. However, ensuring that the BAS protocols are secure and cannot be easily compromised. . Developing a highly secure biometric authentication protocol is challenging, and proving its correctness is another challenge. In this work, we present a modern mechanism for formally analyzing biometric authentication security protocol by taking a Aadhaar Level-0 Iris-based Authentication Protocol as a use case. The mechanism uses formal methods to formally verify the security of the Aadhaar Level-0 Iris-based Authentication protocol, and is based on the widely-used BAN logic (Buruccu, Abadi, and Needham). Using Scyther model checker we analyze the existing biometric authentication protocol and have shown its effectiveness in identifying potential security vulnerabilities. The proposed mechanism is based on a set of security requirements that must be met for the protocol to be considered secure. These requirements include the need for the protocol to be resistant to replay attacks, man-in-the-middle attacks, and impersonation attacks. The mechanism also considers the possibility of an attacker obtaining the biometric data of a legitimate user.
Style APA, Harvard, Vancouver, ISO itp.
41

Dr Valsamma KM, Dr Valsamma KM. "Aadhaar, Function Creep and The Emerging Symbiotic Relationship between Society and Technology". Paripex - Indian Journal Of Research 3, nr 8 (15.01.2012): 184–85. http://dx.doi.org/10.15373/22501991/august2014/56.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
42

Martin, Aaron. "Aadhaar in a Box? Legitimizing Digital Identity in Times of Crisis". Surveillance & Society 19, nr 1 (5.03.2021): 104–8. http://dx.doi.org/10.24908/ss.v19i1.14547.

Pełny tekst źródła
Streszczenie:
The political drive to develop digital identity systems, in particular in the Global South with financial and technical support provided by international development actors, is accelerating during the COVID-19 pandemic. There are different reasons for this redoubling of attention to digitizing identities. These include an increased emphasis on digital social protection during the pandemic and the emergence of proposals for digital vaccination/immunity certificates to facilitate the reopening of societies and restoration of economies, which it is argued would need to be supported by robust digital identity infrastructures. Without evaluating the merits of claims about the capacity of digital identity systems to address the various challenges posed by COVID-19, in this paper I instead make a theoretical observation before raising a policy concern. First, I draw attention to the rise of India’s Aadhaar as an exemplar of developmental digital identity, which has intensified during the pandemic, and what this might mean for concepts of surveillance. I then conclude with a call to the development community to take more seriously investments in data protection regulatory capacity in countries where they are supporting digital identity projects.
Style APA, Harvard, Vancouver, ISO itp.
43

Chaudhuri, Bidisha. "Paradoxes of Intermediation in Aadhaar: Human Making of a Digital Infrastructure". South Asia: Journal of South Asian Studies 42, nr 3 (4.05.2019): 572–87. http://dx.doi.org/10.1080/00856401.2019.1598671.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
44

Dayal, Mohit, i Nanhay Singh. "An Anatomization of Aadhaar Card Data Set – A Big Data Challenge". Procedia Computer Science 85 (2016): 733–39. http://dx.doi.org/10.1016/j.procs.2016.05.260.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
45

Tarafdar, Pratik, i Indranil Bose. "Systems theoretic process analysis of information security: the case of aadhaar". Journal of Organizational Computing and Electronic Commerce 29, nr 3 (3.07.2019): 209–22. http://dx.doi.org/10.1080/10919392.2019.1598608.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
46

Singh, Rashmi. "Extension of Wiener’s Approach on Security on Aadhaar Card based ATM System". International Journal of Computer Applications 155, nr 11 (15.12.2016): 27–33. http://dx.doi.org/10.5120/ijca2016912440.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
47

Addo, Atta, i Silvia Masiero. "Platform Ecosystems as Complex Adaptive Systems: Exploring Emergence in India’s Aadhaar Project". Academy of Management Proceedings 2019, nr 1 (1.08.2019): 12049. http://dx.doi.org/10.5465/ambpp.2019.12049abstract.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
48

Addo, Atta, i PK Senyo. "Beyond Access: Reconceptualizing Digital Identification and Inclusion Through the Case of Aadhaar". Academy of Management Proceedings 2020, nr 1 (sierpień 2020): 17762. http://dx.doi.org/10.5465/ambpp.2020.17762abstract.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
49

Harie Priya, Dr Puja, Dr J. Brintha Jei i Dr K. Murugesan. "Role of Unique Identification Number and Barcode of Aadhaar in Forensic Odontology". Saudi Journal of Oral and Dental Research 6, nr 4 (11.04.2021): 148–50. http://dx.doi.org/10.36348/sjodr.2021.v06i04.002.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
50

Patel, Disha, Adrij Datta, Ganesh Bhise, MD Chethan i DB Nandeeshwar. "Identification of the deceased in disaster by barcode: Aadhaar-linked complete denture". International Journal of Forensic Odontology 4, nr 1 (2019): 43. http://dx.doi.org/10.4103/ijfo.ijfo_36_18.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii