2017
DOI: 10.3991/ijet.v12i04.6478
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Authentication Scheme for E-assessments Based on Student Behavior over E-learning Platform

Abstract: Abstract-E-Learning and distance education have become common choices for academic institutions. Based on advances in information technology systems, educational institutions have enabled the employment of e-learning systems as teaching courses and evaluation students. However, security issues related to e-learning systems have been raised by e-learning environment stakeholders which including faculty members, and students as well as data. In addition, e-learning opponents argue that incapability of e-learning… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
25
0
3

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 36 publications
(29 citation statements)
references
References 17 publications
0
25
0
3
Order By: Relevance
“…As a result, the feedback from the teacher to the student is of great importance, especially, when it is necessary to give a detailed and timely review, but it is a lengthy process. The solution of the problems in the field of electronic assessment of students is given in the works of Baneres, Baró, Guerrero-Roldán, & Rodriguez (2016); Khlifi & El-Sabagh (2017).…”
Section: Discussion Issues Of the Use Of Smart-technologiesmentioning
confidence: 99%
“…As a result, the feedback from the teacher to the student is of great importance, especially, when it is necessary to give a detailed and timely review, but it is a lengthy process. The solution of the problems in the field of electronic assessment of students is given in the works of Baneres, Baró, Guerrero-Roldán, & Rodriguez (2016); Khlifi & El-Sabagh (2017).…”
Section: Discussion Issues Of the Use Of Smart-technologiesmentioning
confidence: 99%
“…This solution used Public Key Infrastructure (PKI) to authenticate the participating entities, and assumes the existence of an examination center controlled by a supervisor for monitoring the examinees. The scheme of Khlifi and El-Sabagh [34] was dealing with e-assessment issue where authors integrate available databases authentication technologies in conjunction with e-learning environments for controlling unethical behavior during e-assessment process. The Fine-grained access control is granted by the use of challenging questions as knowledge based technique that rely on student profile, course activities, etc.…”
Section: A Cryptographic Based Schemesmentioning
confidence: 99%
“…Meanwhile, the instructor is responsible for overseeing or tracking the process. However, the administrator is responsible for managing the entire system, and the registration unit is related to controlling the admissions process for each student's course (Khlifi & El-Sabagh, 2017). E-assessment is also a part that is integrated into e-learning systems that are used to assess student knowledge (Ristov et al, 2013).…”
Section: A E-assessment Systemmentioning
confidence: 99%
“…E-assessment is also a part that is integrated into e-learning systems that are used to assess student knowledge (Ristov et al, 2013). In addition, the e-assessment that depends on learning management systems increases more security issues than other parts of e-learning software (Khlifi & El-Sabagh, 2017). Therefore, the use of e-assessment is important as a substitute for traditional assessment because assessment can be more student-centric as students by identifying gaps in their learning (Kuikka, Kitola, & Laakso, 2014).…”
Section: A E-assessment Systemmentioning
confidence: 99%