2020
DOI: 10.32508/stdjet.v3isi1.516
|View full text |Cite
|
Sign up to set email alerts
|

Authentication in E-learning systems: Challenges and Solutions

Abstract: Digitization is gradually penetrating all aspects of modern society. As it changes the way people communicate, technology has revolutionized education and training in the 21st century. With the advantages of reasonable costs and flexible study time, online training is increasingly seen as an attractive alternative to the full-time on-campus training model. To assure quality of distance training and learning, it is crucial for the online learning management system to make sure the person accessing the course re… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 18 publications
0
3
0
Order By: Relevance
“…Identity misuse occurs when the learner actively gives access to their account to someone else, or their account is accessed by unauthorised parties who have attacked the authentication process (typically via the use of stolen credentials) [20]. The former case has already been described as a form of academic misconduct.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Identity misuse occurs when the learner actively gives access to their account to someone else, or their account is accessed by unauthorised parties who have attacked the authentication process (typically via the use of stolen credentials) [20]. The former case has already been described as a form of academic misconduct.…”
Section: Introductionmentioning
confidence: 99%
“…By their very nature, online learning environments allow students to access the system remotely. The hosting educational institution has no control over remote students, and this places an added essential requirement on the learning management system to ensure the learner is a legitimate registrant on the system, especially when assessments are concerned [4,20].…”
Section: Introductionmentioning
confidence: 99%
“…To secure authentication data integrity, InterPlanetary File System (IPFS) is proposed to store data on a Merkle Directed Acyclic Graph (DAG) file structure, which combines a Merkle tree and a Guided Ring graph. IPFS uses SHA-1, SHA-256, and BLAKE2 cryptographic hash functions to guarantee immutability and immunity to DDoS attacks on the authentication process [11].…”
Section: Cryptographic Techniques In E-learning Technologiesmentioning
confidence: 99%