Proceedings of the 45th International Conference on Application of Mathematics in Engineering and Economics (Amee’19) 2019
DOI: 10.1063/1.5133513
|View full text |Cite
|
Sign up to set email alerts
|

Authentication with TeSLA system instruments supporting eAssessment models in engineering courses

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(9 citation statements)
references
References 9 publications
0
9
0
Order By: Relevance
“…It verifies a user's credentials using the system's defined authenticator to ensure that the users are who they say they are. The identity assurance ensures the identity of the learners in online learning environments while authorship assurance is concerned with the identity of the creator of user-generated content in order to ensure that the learning outcomes are achieved by the authenticated user [40,48,49]. Table 2 provides the overview of authentication process in the surveyed paper and what authenticators are used for identity assurance and authorship assurance.…”
Section: B Authentication Processmentioning
confidence: 99%
See 3 more Smart Citations
“…It verifies a user's credentials using the system's defined authenticator to ensure that the users are who they say they are. The identity assurance ensures the identity of the learners in online learning environments while authorship assurance is concerned with the identity of the creator of user-generated content in order to ensure that the learning outcomes are achieved by the authenticated user [40,48,49]. Table 2 provides the overview of authentication process in the surveyed paper and what authenticators are used for identity assurance and authorship assurance.…”
Section: B Authentication Processmentioning
confidence: 99%
“…Table 2 provides the overview of authentication process in the surveyed paper and what authenticators are used for identity assurance and authorship assurance. Behaviour analysis [40] Face, Voice Writing/Plagiarism detection [41] Face, Keystroke Face, Keystroke [23] Face Face [42] Keystroke Keystroke [25] Face, Fingerprint, Keystroke [43] Face Eye-Gaze [44] Keystroke OLP [21] Keystroke Keystroke [26] Face, Mouse, Keystroke, Touch, Voice [45] Keystroke Keystroke [16] Face, Keystroke, Voice Behaviour analysis, Computer monitoring VL [46] Face Face tracking…”
Section: B Authentication Processmentioning
confidence: 99%
See 2 more Smart Citations
“…Jorgensen, Yu [102] stored a mix of fingerprint and mouse dynamics. Durcheva, Rozeva Stored facial images and voices of students [103]. Teh,et.al.…”
Section: Multi-factorsmentioning
confidence: 99%