CFP last date
20 March 2024
Call for Paper
April Edition
IJCA solicits high quality original research papers for the upcoming April edition of the journal. The last date of research paper submission is 20 March 2024

Submit your paper
Know more
Reseach Article

An Enhanced Electronic Voting System (EnEVoS) with Hybrid Authentication Technique

by Margaret Dumebi Okpor
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 169 - Number 1
Year of Publication: 2017
Authors: Margaret Dumebi Okpor

Margaret Dumebi Okpor . An Enhanced Electronic Voting System (EnEVoS) with Hybrid Authentication Technique. International Journal of Computer Applications. 169, 1 ( Jul 2017), 1-5. DOI=10.5120/ijca2017912060

@article{ 10.5120/ijca2017912060,
author = { Margaret Dumebi Okpor },
title = { An Enhanced Electronic Voting System (EnEVoS) with Hybrid Authentication Technique },
journal = { International Journal of Computer Applications },
issue_date = { Jul 2017 },
volume = { 169 },
number = { 1 },
month = { Jul },
year = { 2017 },
issn = { 0975-8887 },
pages = { 1-5 },
numpages = {9},
url = { },
doi = { 10.5120/ijca2017912060 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
%0 Journal Article
%1 2024-02-07T00:16:09.043778+05:30
%A Margaret Dumebi Okpor
%T An Enhanced Electronic Voting System (EnEVoS) with Hybrid Authentication Technique
%J International Journal of Computer Applications
%@ 0975-8887
%V 169
%N 1
%P 1-5
%D 2017
%I Foundation of Computer Science (FCS), NY, USA

Elections are the bedrock of democracy and voting is one of the electoral processes that ensure the sustenance of democracy, political growth and democratic stability of any society. We have designed an Enhanced Electronic Voting System (EnEVoS) with a Hybrid Authentication Technique, which will reduce electoral malpractices and manipulation of results to its barest minimum. The implementation of this Enhanced Electronic Voting System (EnEVoS) in Nigeria will boost the integrity and image of Independent National Electoral Commission (INEC). The programs used to develop this system are, Java and MySQL. These packages make the Graphic Interface User friendly for even those with little or no computer knowledge.

  1. Aditya, R. et al. (2004.) Implementation Issues In Secure E-Voting Schemes, Proceedings Of The Fifth Asia Pacific Industrial Engineering And Management Systems Conference
  2. Adebayo. O. and Abdulhamid S. M. (2010). Exams System for Nigerian Universities with Emphasis on Security and Result Integrity‖, Book of Proceedings of TheSeventh International Conference on eLearning for Kowledge-Base Society. Held at Bangkok Metropolitan Area, Thailand. Page 47.1-47.11.2010.
  3. Animashaun K (2010): Regime Character, Electoral Crisis And Prospects Of Electoral Reform In Nigeria. Journal Of Nigeria Studies Volume 1, Number 1, Fall 2010.
  4. Benaloh, J. & Tuinstra, D. (1994). Receipt-Free Secret-Ballot Elections, In Proceedings Of The 26th Acm Symposium On Theory Of Computing (Stoc’94), Montreal, Canada, Pp. 544-553.
  5. Benoit, D. K. (2004). Experience with Voting Overseas.Appendix 2J to the first Report Of Ireland’s Commission On Electronic Voting.
  6. Brennock, M. (2004). Cabinet to Press Ahead On E-Voting In EU And Local Polls. The Irish Times.
  7. Buchsbaum, T. (2004). E-Voting: International Developments And Lessons Learnt". Proceedings Of Electronic Voting In Europe Technology, Law, Politics And Society. Lecture Notes In Informatics. Workshop Of The Esf Ted Programme Together With Gi And Ocg.
  8. Caltech-Mit. (2001). Voting: What is, What Could Be. Cal Tech-Mit Voting Technology Project Report Www.Vote.Caltech.Edu/ Reports.
  9. Cetinkaya, O. & Cetinkaya, D. (2007). Towards Secure E-Elections In Turkey: Requirements And Principles, International Workshop On Dependability And Security In E-Government (Desegov’07) - In Proceedings Of Ares’07, Vienna, Austria, Pp. 903-907.
  10. Chaum, David (2000). Secret-Ballot Receipts And Transparent Integrity,. David Chaum, Draft. Available at http://www.vreceipt.Com/Article.Pdf
  11. Cranor, L. & Cytron, R. (1997). Sensus: A Security-Conscious Electronic Polling System For The Internet”, In Proceedings Of The 30th Annual Hawaii International Conference On System Sciences, Wailea, Hawaii.
  12. Folorunso, O. et al., (2010). Visualizing E-Voting Results‖, Journal of Theoretical and Applied Information Technology. available at:
  13. Inec Manual For Election Officials (2015). Funded By The European Union Through The UNDP Democratic Governance For Development (DGD) Project.
  14. 14] Kabiru G. (2015)Local Government Elections and Democratic Consolidation in Nigeria, 13(2) JORIND 1
  15. Mohammed D A et al (2013) The Design and Development of Real-Time EVoting System in Nigeria with Emphasis on Security and Result Veracity, I. J. Computer Network and Information Security
  16. Okediran O. et al., (2001). A Framework For A Multifaceted Electronic Voting System, International Journal Of Applied Science And Technology Philadelphia, Usa, Vol. 1 No.4, Pp 135-142; July
  17. Omolaye P. O. (2015) Systemic Evaluation of Semi-Electronic Voting System adopted in Nigeria 2015 General Elections, American Journal of Information Systems, Vol. 3, No. 1
  18. Vishal V. N (2014). E-Voting Using Biometric. International Journal Of Emerging Technology And Advanced Engineering www.Ijetae.Com
  19. Yekini, N.A., et al., (2012). Computer-Based Automated Voting Machine (Avm) For Elections In Nigeria. International Journal Of Computer Science And Network Security, Vol.12 No.5, May 2012.
  20. Zissis, D. (April 2011). Securing E-Government And E-Voting With An Open Cloud Computing Architecture. Government Information Quarterly 28 (2): 239–251.
Index Terms

Computer Science
Information Sciences


EnEVoS Biometric Authentication Database Security INEC VIN