Academic literature on the topic 'Aadhaar Authentication'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Aadhaar Authentication.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Aadhaar Authentication"

1

Swapnil S Ninawe. "A Method of Designing Authentication Scheme for Aadhaar User." Journal of Information Systems Engineering and Management 10, no. 11s (2025): 97–108. https://doi.org/10.52783/jisem.v10i11s.1499.

Full text
Abstract:
The Unique IDentification (UID) project is the flagship of government of India. The UID number or aadhaar number, which is a twelve-digit number, is issued by UID Authority of India (UIDAI) for all the citizens of India. Nowadays, government of India has made mandatory to connect aadhaar cards to other government issued documents such as bank passbook, PAN card, ration card, driving licence, SIM card, etc. Connecting aadhaar number to different social schemes has helped government in detection of multiple user accounts across different schemes. But this itself is not enough, since many users utilise social scheme facility for different purposes such as ration, subsidy, acquiring loan, special concessions, interest rates, etc. Presently there is no method at place, which can find out which social scheme authority must receive what information about users. In this paper, we propose a novel authentication scheme for revealing appropriate user information to social scheme authority. The method involve use of aadhaar number which is connected to user’s name, gender, address, mobile number, etc. The designed system is simulated over authentication of a group of users across different social schemes. Our method can be used as a tool for securely authenticating officials for disclosure of user information. Introduction: A Method of Designing Authentication Scheme for Aadhaar User - focuses on enhancing secure data sharing through Aadhaar. The paper proposes a novel authentication system to disclose specific user information to social scheme authorities, ensuring appropriate and secure access. By leveraging Aadhaar's connectivity with user data, the scheme facilitates precise authentication for various social benefits. The simulated method demonstrates secure and efficient data authentication for multiple schemes. Objectives: The primary objective of this study is to design and develop a novel authentication scheme that securely manages the disclosure of Aadhaar-linked user information to various social scheme authorities. The proposed system aims to address the lack of existing methods for determining which information should be shared with specific authorities based on the social schemes they govern. By leveraging the Aadhaar database, which contains user details such as name, gender, address, and mobile number, the scheme ensures precise and secure authentication. Methods: The proposed method involves the development of a secure authentication scheme utilizing Aadhaar numbers as the primary identifier, linked to user-specific details such as name, gender, address, and mobile number. The system is designed to authenticate users based on their eligibility for various social schemes and ensure that only the necessary information is disclosed to the respective scheme authorities. This approach incorporates data encryption and access control mechanisms to protect sensitive user data and prevent unauthorized access. The method is simulated on a group of users, testing the authentication process across multiple social schemes to evaluate its efficiency and security. The simulation results demonstrate how the system enables precise information sharing, ensuring compliance with privacy regulations and enhancing trust in Aadhaar-based authentication processes. Results: The proposed simulation results demonstrate the effectiveness and reliability of the authentication scheme in securely managing Aadhaar-based user information across various social schemes. The simulation involved a diverse group of users, each with unique eligibility criteria for specific government schemes such as subsidies, loans, and concessions. The system successfully authenticated users by verifying their Aadhaar-linked details and disclosed only the necessary information to the corresponding scheme authorities. The results highlighted the scheme's ability to prevent unauthorized access and protect user privacy through encryption and access control mechanisms. Additionally, the simulation confirmed the scheme's efficiency in handling multiple user authentications simultaneously, with minimal processing delays and accurate data sharing. These findings validate the potential of the proposed method to enhance the security and functionality of Aadhaar-based authentication systems. Conclusions: The study presents a novel Aadhaar-based authentication scheme designed to securely and efficiently manage the disclosure of user information to various social scheme authorities. By leveraging encryption, access control mechanisms, and Aadhaar-linked user details, the method ensures accurate, privacy-preserving data sharing tailored to the requirements of individual schemes. The simulation results validate the scheme's effectiveness in authenticating users, safeguarding sensitive data, and streamlining access to government benefits. Overall, the proposed authentication framework offers a robust solution to address existing gaps in Aadhaar-based information management, enhancing security, trust, and operational efficiency.
APA, Harvard, Vancouver, ISO, and other styles
2

Vikas, Goel, Aggarwal Mukul, Kumar Gupta Amit, and Kumar Narendra. "A blockchain-based Aadhar system: distributed authentication system." TELKOMNIKA (Telecommunication, Computing, Electronics and Control) 20, no. 6 (2022): 1239–47. https://doi.org/10.12928/telkomnika.v20i6.24231.

Full text
Abstract:
An Aadhaar is a unique number issued to every citizen in India.<em><strong>&nbsp;</strong></em>Aadhar&rsquo;s current identity authentication relies on the central identities data repository (CDIR) of the unique identification authority of India (UIDAI), which is at risk of a single-point fault attack. Perhaps worse, internal attacks can tamper with the sensitive data of authenticated devices without being detected. In this paper, the proposed system utilizes emerging technology: blockchain for solving the issue of centralized authentication. The proposed system provides a distributed, secure, and tamper-proof ledger platform for Aadhar in that Aadhar is implemented using blockchain ethereum technology. The proposed system considers the unique Aadhar identification (ID) for each citizen of India and registered it on the smart contract of ethereum so that this unique ID may be authenticated by each other in a peer-to-peer network without a central authority. For securing the data, the proposed framework uses hashing technique for significant data (i.e. firmware). Blockchain stores hashed data and instantly any change in the state of the data may be possible to detect.
APA, Harvard, Vancouver, ISO, and other styles
3

Sharmin, Kamila I. "AADHAAR ENABLED PAYMENT SYSTEM – A NEW INNOVATION TO DIGITAL PAYMENTS OF INDIA." International Journal of Research -GRANTHAALAYAH 8, no. 4 (2020): 67–71. http://dx.doi.org/10.29121/granthaalayah.v8.i4.2020.8.

Full text
Abstract:
Aadhaar enabled payment system (AEPS) is a type of payment system that is based on the unique identification number and allows Aadhaar card holder seamlessly make financial transaction through Aadhaar based authentication. The AEPS framework expects to enable all the areas of society by making monetary and banking administrations accessible to all the Aadhaar. AEPS is context through one can make fund transfer, make disbursement, make cash deposit, make extractions, make request for information about bank balance etc.
APA, Harvard, Vancouver, ISO, and other styles
4

Kamila, Sharmin. I. "AADHAAR ENABLED PAYMENT SYSTEM – A NEW INNOVATION TO DIGITAL PAYMENTS OF INDIA." International Journal of Research - Granthaalayah 8, no. 4 (2020): 67–71. https://doi.org/10.29121/granthaalayah.v8.i4.2020.8.

Full text
Abstract:
Aadhaar enabled payment system (AEPS) is a type of payment system that is based on the unique identification number and allows Aadhaar card holder seamlessly make financial transaction through Aadhaar based authentication. The AEPS framework expects to enable all the areas of society by making monetary and banking administrations accessible to all the Aadhaar. AEPS is context through one can make fund transfer, make disbursement, make cash deposit, make extractions, make request for information about bank balance etc.
APA, Harvard, Vancouver, ISO, and other styles
5

Pasupuleti, Murali Krishna. "Scalable Digital Solutions from India’s Aadhaar and UPI Frameworks." International Journal of Academic and Industrial Research Innovations(IJAIRI) 05, no. 04 (2025): 278–87. https://doi.org/10.62311/nesx/rp2325.

Full text
Abstract:
Abstract: India’s Aadhaar and Unified Payments Interface (UPI) frameworks represent two of the most ambitious and scalable digital infrastructure projects in the world, revolutionizing identity verification and real-time financial transactions. This research paper examines the architectural design, operational dynamics, and socio-economic impact of these systems, emphasizing their role in promoting financial inclusion, digital governance, and economic resilience. Through empirical data analysis, policy evaluation, and case studies, the paper highlights how Aadhaar’s biometric identification and UPI’s interoperable payment ecosystem have addressed systemic inefficiencies and enabled citizen-centric service delivery at scale. Furthermore, the study explores the replicability of these models in diverse global contexts and evaluates their potential for adaptation in emerging economies. By integrating insights from digital public infrastructure, cybersecurity, and inclusive policy design, this paper presents Aadhaar and UPI as paradigms of scalable, secure, and transformative digital solutions for the modern state. Keywords: Aadhaar, UPI, digital identity, real-time payments, financial inclusion, digital public infrastructure, scalable digital solutions, IndiaStack, biometric authentication, digital governance
APA, Harvard, Vancouver, ISO, and other styles
6

R., Pradeep, N. R. Sunitha, and G. S. Thejas. "A Modern Mechanism for Formal Analysis of Biometric Authentication Security Protocol." International Journal of Computer Network and Information Security 15, no. 3 (2013): 15–29. http://dx.doi.org/10.5815/ijcnis.2023.03.02.

Full text
Abstract:
A Biometric Authentication Security (BAS) protocol is a method by which a person's unique physiological or behavioral characteristics are used to verify their identity. These characteristics can include fingerprints, facial features, voice patterns, and more. Biometric authentication has become increasingly popular in recent years due to its convenience and perceived security benefits. However, ensuring that the BAS protocols are secure and cannot be easily compromised. . Developing a highly secure biometric authentication protocol is challenging, and proving its correctness is another challenge. In this work, we present a modern mechanism for formally analyzing biometric authentication security protocol by taking a Aadhaar Level-0 Iris-based Authentication Protocol as a use case. The mechanism uses formal methods to formally verify the security of the Aadhaar Level-0 Iris-based Authentication protocol, and is based on the widely-used BAN logic (Buruccu, Abadi, and Needham). Using Scyther model checker we analyze the existing biometric authentication protocol and have shown its effectiveness in identifying potential security vulnerabilities. The proposed mechanism is based on a set of security requirements that must be met for the protocol to be considered secure. These requirements include the need for the protocol to be resistant to replay attacks, man-in-the-middle attacks, and impersonation attacks. The mechanism also considers the possibility of an attacker obtaining the biometric data of a legitimate user.
APA, Harvard, Vancouver, ISO, and other styles
7

T M, Navamani, Tajinder Singh Sondhi, and Shivam Ghildiyal. "DigiVoter: Blockchain Secured Digital Voting Platform with Aadhaar ID Verification." ECS Transactions 107, no. 1 (2022): 7427–40. http://dx.doi.org/10.1149/10701.7427ecst.

Full text
Abstract:
The Election Commission of India has talked about India's Electronic Voting Machines (EVMs) as dependable and impeccable, yet comparable electronic voting machines utilized around the world have shown to experience the ill effects of genuine security issues. This research aims to build a digital voting platform secured with the revolutionary concept of blockchain. A naive implementation of the same using Python for biometric authentication and NodeJs to create the blockchain is presented. It secures the blocks using 512-bit SHA-2 (Secure Hashing Algorithm 2). For authentication of users, the proposed model incorporates the use of biometric data which will be mapped to the cryptic unique Aadhaar card number of the voter. Thus, a platform is proposed to make the voting procedure easier, secured, and fault tolerant using blockchain. The results show secure vote casting by biometric authentication and saving in an immutable distributed fashion, thus keeping it safe from being altered.
APA, Harvard, Vancouver, ISO, and other styles
8

Gowtham R, Mohankumar A., and Gokul B. "Enhancing Electoral Integrity: A Fingerprint-Verified Voting System for Fair and Secure Elections." Asian Journal of Applied Science and Technology 08, no. 01 (2024): 33–46. http://dx.doi.org/10.38177/ajast.2024.8103.

Full text
Abstract:
Voting is a significant method through which citizens in democratic nations like India can express their opinions. Voters often use polling booths to cast their ballots. Voting is now done via an electronic voting machine thanks to advancements in technology. This essay discusses a fingerprint-verified voting machine that is Internet of Things based. The primary goals of this project are to decrease voting malpractices and make voting safer with fingerprint verification. Voter information is kept in a database along with their fingerprint. The system verifies the user's Aadhaar number and, if verified, determines whether more than one vote has been cast if the fingerprint matches the stored fingerprint. A "Matching failed" message will appear if the fingerprint matching is incorrect, and an "Aadhar not match" message will appear if the Aadhaar number is incorrect. The controller used in this project is an Arduino Uno. The user's fingerprint is used for authentication. Everybody's fingerprints differ from one another, if not slightly. A notification stating "Already voted" will appear in the event of malpractice. The ballot card is displayed and the result is stored on the cloud using the Arduino IDE for board programming. Only authorized voters may cast ballots, and the system alerts users to instances of fraud. This project ensures fair elections and protects citizens' right to vote.
APA, Harvard, Vancouver, ISO, and other styles
9

K. Vasuki Devi. "Energizing ATM Security by Sending OTP to Aadhar Card-Linked Mobile Number and Using Fingerprint." Journal of Information Systems Engineering and Management 10, no. 53s (2025): 988–94. https://doi.org/10.52783/jisem.v10i53s.11151.

Full text
Abstract:
ATMs are utilized by everyone to withdraw and transfer money in today's environment. The implementation of fingerprint mechanisms in the ATM system served as the basis for this study. We chose this location in order to make transactions easier and safer for all clients. Each person's fingerprints have unique minute characteristics. You don't have to have your ATM card with you at all times, and you don't have to worry about losing it. It is shown that fingerprint technology outperforms and is safer than other technologies when compared to other technologies used for ATM security. It makes transactions simple and safe while preserving an environment that is easy to use for both users and ATMs. When it comes to electronic money transactions, this technology is the most promising. Sending OTP to Aadhaar-linked Phone Number. Aadhaar Linking: The user must have their mobile number linked to their Aadhaar card for this process to work. This number is stored in the bank’s system as part of their KYC (Know Your Customer) records. OTP Generation: After fingerprint authentication, the ATM will trigger the bank’s system to generate a one-time password (OTP). SMS Delivery: The generated OTP is then sent via SMS to the mobile phone number linked with the user’s Aadhaar account.
APA, Harvard, Vancouver, ISO, and other styles
10

Harikrishan, Jakhar. "Unmasking Aadhar Authentication Issues: A Case Study of Biometric and PDS Access in Mundoti, Rajasthan." Indian Journal of Social Science and Literature (IJSSL) 3, no. 3 (2024): 28–31. https://doi.org/10.54105/ijssl.C1114.03030324.

Full text
Abstract:
<strong>Abstract:</strong> This paper goes into great depth about how hard India's Aadhaar-based identification system is to understand, especially when it comes to how important it is for people to be able to access simple services. Most of the study is about Mundoti, a village in Kishangarh, Rajasthan, where people's farming and hard work-based lives have made it hard to use Aadhaar. The paper looks at how common negative fingerprinting is and how it affects people's ability to use the Public Distribution System (PDS). It does this through a case study and direct and indirect research methods. Through conversations, it looks into the connection between having to wear fingerprints at work, demographics, and any possible effects on PDS. The study says that the people of Mundoti have trouble with Fingerprint authentication because of work in agriculture. This means that they are facing problems in getting important food aid. The study makes it clear that these problems need to be fixed. The people who live in Mundoti have trouble verifying their Aadhaar cards because their fingerprints are worn down from working hard in agriculture. The study also shows that age, gender, and job have a big effect on how likely it is that you will have identification problems. The paper argues that these fingerprint-related problems should be fixed so that important social aid programs can be carried out successfully in rural India. It suggests creating different ways to prove your identities, like eye scans or private biometric-based solutions so that vulnerable people aren't kept from important services like PDS as much as possible. This paper adds to the larger conversation about local ecosystems that includes everyone. It stresses how important it is to change rules and procedures to fit the needs of people living in rural areas.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Aadhaar Authentication"

1

Jain, Ankit Kumar, Sahil Kalra, Karan Kapoor, and Vishal Jangra. "Blockchain-Based Secure E-voting System Using Aadhaar Authentication." In Studies in Computational Intelligence. Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-6290-5_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sowmiya, B., Iyer Harini Umamaheshwaran, Chhetri Priyanka, and B. Ida Seraphim. "Distributed Updation and Authentication of Aadhaar Leveraging Blockchain Technology." In Sixth International Conference on Intelligent Computing and Applications. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-1335-7_31.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Deepshikha and Siddhartha Chauhan. "Aadhaar-Based Authentication and Authorization Scheme for Remote Healthcare Monitoring." In Advances in Intelligent Systems and Computing. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-6067-5_34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Nair, Ashwin, and Burak Eskici. "Digital Public Services: The Development of Biometric Authentication in India." In Introduction to Development Engineering. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-86065-3_20.

Full text
Abstract:
AbstractLow state capacity makes it difficult for governments in developing countries to deliver resources to the poor. In this chapter, we highlight the role that biometric authentication can play in delivering payments and subsidized food to the poor. We describe the implementation and evaluation of two different biometric authentication systems in Andhra Pradesh (“AP Smartcards”) and Jharkhand (“Aadhaar”), India. Results from two large-scale RCTs (Muralidharan et al., 2016 and Muralidharan et al., 2020b) showed that more accurate biometric ID systems, coupled with payments and policy reforms, reduced leakages in welfare schemes in both Andhra Pradesh and Jharkhand. However, there were varying results on beneficiary welfare. In Jharkhand, reduced fiscal leakage came at the expense of excluding genuine beneficiaries who were unable to meet new standards for identification. Exclusion of beneficiaries was low in Andhra Pradesh, where the government was more focused on improving beneficiary experience with welfare programs. The studies discussed in this chapter highlight how differences in policy priorities and the details of solution design influence the extent to which beneficiaries benefit from biometric authentication and accompanying reforms.
APA, Harvard, Vancouver, ISO, and other styles
5

Bhardwaj, Aashish, and Dale Cyphert. "Direct Benefit Transfer Using Aadhaar." In Advances in Electronic Government, Digital Divide, and Regional Development. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-1791-8.ch008.

Full text
Abstract:
This chapter illustrates how Aadhaar, India's unique identity number, has been used to develop applications such as direct benefit transfer and micro payment solutions that improve existing governmental processes and lead to economic development. This chapter details the Aadhaar success stories of Direct Benefit Transfer in removing corruption and implementing transparency. Successful applications include Pradhan Mantri Matru Vandana Yojana (PMMVJ), State Health Society (Bihar), Aadhaar Enabled Payment System (AePS), Nutrition and Health Tracking System (NHTS), Aadhaar Enabled Public Distribution System (AePDS), and Adhaar Enabled Fertilizer Distribution System (AeFDS). Specific process improvement case studies illustrate purchasing new SIM cards and land transfer to support the authentication and removing fake entries. The chapter addresses administrative technology and legal challenges, which the initiative faced during its implementation.
APA, Harvard, Vancouver, ISO, and other styles
6

Muttipati, Appala S., Sangeeta Viswanadham, and Brahmaji Godi. "Humanoid Robot for Aadhaar Service in Rural Development." In Artificial Intelligence for Smart Cities and Villages: Advanced Technologies, Development, and Challenges. BENTHAM SCIENCE PUBLISHERS, 2022. http://dx.doi.org/10.2174/9789815049251122010006.

Full text
Abstract:
According to the norms of the Indian government, Aadhaar provides singlesource identity verification across the country for the residents. Currently, Aadhaar services are inadequate in our country. Even now, more than 30% of our Indian population's information is not available with the Aadhaar server. According to the 2019 population census, about 89 crores of people are residents in rural areas. In our country, due to more population and fewer resources, much of the rural people’s information is not completely informed up to the mark. Even the government is taking relevant steps to collect the right information from the rural people. In this concern, other hidden reasons are also affecting rural development such as lack of education, awareness, and nearby resources. In the existing scenario, no sufficiently advanced automation system is available for Aadhaar services in rural areas. In the view of the Aadhaar grievance service, to overcome these issues researchers have proposed a model that can support the existing system using humanoid robots with an Artificial Intelligence (AI) technique. The present study is about the humanoid robot which collects the information and process mechanisms with similarity to the human mind. It is designed with various integrated devices such as an Iris scanning system, User interface display board, Fingerprint authenticator, automated printer, etc. An AI decision marking system supports user interaction with the Robot. It accepts the authentication and allows the user for further interaction.
APA, Harvard, Vancouver, ISO, and other styles
7

Sriraman, Tarangini. "The Document in the Digital." In In Pursuit of Proof. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780199463510.003.0005.

Full text
Abstract:
Considered within the history of documenting welfare beneficiaries in India, the Aadhaar is unprecedented in that the unique number is a digital, portable identity and part of ‘a larger administrative and technological regime’ (Bennett and Lyon 2008) of cloud-based authentication. This chapter argues, however, that the production of this identifier has necessitated miming existing bureaucratic habits of inscription and mobilizing the rhetoric, ritualism and the materiality common to processes of issuing and verifying identification documents. Far from being an ID that is insulated from the host of administratively restrictive genres of identification documents like ration cards and caste certificates, the Aadhaar is relevant only within a paper-based matrix of elite norms of proof, urban spatiality of power brokerage, and the politics of staking out regional identities. Based on an intensive ethnography around a rural poor community, the chapter shows that the current welfare ecology still contingent on address norms requires not so much an electronic number identifier but rather a dynamic interplay of popular, quasi-legal, and legal documents of identity.
APA, Harvard, Vancouver, ISO, and other styles
8

Poornima, S., Shravani Tejrao Mankar, Vaishnavi Satyavijay Parab, Atharva Mangesh Sawant, and Swaraj Chandrakant Darekar. "Life key Connect Using Blockchain Technology for Healthcare Sector." In Modern Digital Approaches to Care Technologies for Individuals With Disabilities. IGI Global, 2025. https://doi.org/10.4018/979-8-3693-7560-0.ch010.

Full text
Abstract:
Integrating advanced technology into the medical sector is crucial for modernizing healthcare. Even though the equipments are high tech, digitalization of documents from start to end is not complete. Blockchain technology could address this gap by ensuring secure, transparent storage and sharing of medical records. Additionally, machine learning (ML) offers the potential to predict diseases and assess risk levels, enhancing diagnostic accuracy and preventive care. The integration of Aadhaar, a unique national identification system, could further strengthen this digital transformation by providing a reliable means of authentication within blockchain systems. Together, these technologies can drive a significant advancement in healthcare, improving data security, predictive capabilities, and overall efficiency.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Aadhaar Authentication"

1

Singh, Rohan, and Oshin Sharma. "Blockchain-based Aadhaar Identification and authentication system." In 2024 1st International Conference on Advanced Computing and Emerging Technologies (ACET). IEEE, 2024. http://dx.doi.org/10.1109/acet61898.2024.10730638.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

N, Veena, and Thejaswini S. "Aadhaar Secure: An Authentication System for Aadhaar Base Citizen Services using Blockchain." In 2022 Fourth International Conference on Cognitive Computing and Information Processing (CCIP). IEEE, 2022. http://dx.doi.org/10.1109/ccip57447.2022.10058669.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Singhal, Shrish Kumar. "Security Analysis of Aadhaar Authentication Process and Way Forward." In 2021 3rd International Conference on Advances in Computing, Communication Control and Networking (ICAC3N). IEEE, 2021. http://dx.doi.org/10.1109/icac3n53548.2021.9725391.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Shanmugapriyan, J., R. Parthasarathy, S. Sathish, and S. Prasanth. "Secure Electronic Transaction Using AADHAAR Based QR Code and Biometric Authentication." In 2022 International Conference on Communication, Computing and Internet of Things (IC3IoT). IEEE, 2022. http://dx.doi.org/10.1109/ic3iot53935.2022.9767978.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Jagjivan, More Priti, Jagdale Prajakta Shrikant, Jaiswal Nisha Vijay, Kale Rucha Pradeep, and Phalke Akshay Suhas. "Secure Digital Voting system based on Aadhaar Authentication by using Blockchain Technology." In 2021 IEEE Mysore Sub Section International Conference (MysuruCon). IEEE, 2021. http://dx.doi.org/10.1109/mysurucon52639.2021.9641577.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Rafi, S. Mohammad, N. Phani Kumar, and Damodaram Jeevan Kumar. "Survey for Interlinking of DNA Models with Aadhaar Real-Time Records for Enhanced Authentication." In 2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS). IEEE, 2019. http://dx.doi.org/10.1109/icaccs.2019.8728512.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Shadab, Mohd, Prashant Kumar, and Saurabh Kumar. "A Blockchain-Based E-Voting System for India: Addressing Security Challenges with Aadhaar Card Authentication." In 2023 3rd International Conference on Pervasive Computing and Social Networking (ICPCSN). IEEE, 2023. http://dx.doi.org/10.1109/icpcsn58827.2023.00207.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Nagaraj, Nikita, and Amit Prakash. "Digital biometric authentication and citizens’ right to food: Neglect of the ‘local’ in India's Aadhaar-enabled Public Distribution System." In ICEGOV 2021: 14th International Conference on Theory and Practice of Electronic Governance. ACM, 2021. http://dx.doi.org/10.1145/3494193.3494239.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography