Security and Privacy in m-Learning and Beyond: Challenges and State-of-the-art
暂无分享,去创建一个
[1] Gerhard Schwabe,et al. Mobile Learning projects - a critical analysis of the state of the art , 2009, J. Comput. Assist. Learn..
[2] Jianming Yong. Security and Privacy Preservation for Mobile E-Learning via Digital Identity Attributes , 2011, J. Univers. Comput. Sci..
[3] Yang Wang,et al. Personalization and privacy: a survey of privacy risks and remedies in personalization-based systems , 2012, User Modeling and User-Adapted Interaction.
[4] Norbert Pachler,et al. Mobile Devices as Resources for Learning: Adoption Trends, Characteristics, Constraints and Challenges , 2010 .
[5] Attila Pethö,et al. A secure electronic exam system , 2010 .
[6] Stefanos Gritzalis,et al. Enhancing Web privacy and anonymity in the digital era , 2004, Inf. Manag. Comput. Secur..
[7] Benjamin Hirsch,et al. Education beyond the cloud: Anytime-anywhere learning in a smart campus environment , 2011, 2011 International Conference for Internet Technology and Secured Transactions.
[8] Georgios Kambourakis,et al. Design and implementation of a secure mobile wiki system , 2008 .
[9] A Min Tjoa,et al. Privacy in e-learning: anonymity, pseudonyms and authenticated usage , 2005, Interact. Technol. Smart Educ..
[10] Zsolt Ugray. Security and privacy issues in mobile learning , 2009, Int. J. Mob. Learn. Organisation.
[11] Edgar R. Weippl. Security in e-learning , 2005, ELERN.
[12] Paul Pocatilu,et al. Secure SMS communications for M-learning services , 2011 .
[13] Defta Costinela Luminita. Information security in E-learning Platforms , 2011 .
[14] Rob Koper,et al. Contextualised Media for Learning , 2008, J. Educ. Technol. Soc..
[15] C. Chellappan,et al. Authentication of e-learners using multimodal biometric technology , 2008, 2008 International Symposium on Biometrics and Security Technologies.
[16] Simon K. S. Cheung,et al. A Review of Mobile Learning in the Mobile Age , 2010, ICHL.
[17] Jianming Yong. Security modelling for e-Learning , 2007, 2007 First IEEE International Symposium on Information Technologies and Applications in Education.
[18] Seoksoo Kim,et al. Study on Contents Protection in M-Learning Environment , 2006, ICCSA.
[19] Sergiu Jecan,et al. An arbitration web service for e-learning based on xml security standards , 2008 .
[20] Hajar Mousannif,et al. Collaborative learning in the clouds , 2013, Inf. Syst. Frontiers.
[21] Sungzoon Cho,et al. Keystroke dynamics-based authentication for mobile devices , 2009, Comput. Secur..
[22] Edgar Weippl. Security considerations in m-learning: threats and countermeasures , 2007 .
[23] Graham Walton,et al. Using mobile technologies to give health students access to learning resources in the UK community setting. , 2005, Health information and libraries journal.
[24] Stewart Kowalski,et al. Secure e-learning using a holistic and immune security framework , 2009, 2009 International Conference for Internet Technology and Secured Transactions, (ICITST).
[25] Gwo-Jen Hwang,et al. A key step to understanding paradigm shifts in e-learning: towards context-aware ubiquitous learning , 2010, Br. J. Educ. Technol..
[26] Paulo Shakarian,et al. Towards Shrink-Wrapped Security: Practically Incorporating Context Into Security Services , 2011, ANT/MobiWIS.
[27] P. R. Lakshmi Eswari. A process framework for securing an e-Learning ecosystem , 2011, 2011 International Conference for Internet Technology and Secured Transactions.
[28] David M. Eyers,et al. An architecture for supporting vicarious learning in a distributed environment , 2004, SAC '04.
[29] Francisco J. Suárez,et al. Security Issues in a Synchronous e-Training Platform , 2011, 2011 Sixth International Conference on Availability, Reliability and Security.
[30] Khalil El-Khatib,et al. Privacy and Security in E-Learning , 2003, Int. J. Distance Educ. Technol..
[31] Geuk Lee,et al. Design of DRM-LMS Model in M-Learning Environment , 2006, KES.
[32] Sérgio Donizetti Zorzo,et al. Service for secure and protected applications in Collaborative Learning Environments , 2010, 2010 IEEE International Conference on Systems, Man and Cybernetics.
[33] Steven Furnell,et al. Authenticating mobile phone users using keystroke analysis , 2006, International Journal of Information Security.
[34] Sebastián Ventura,et al. Using mobile and web‐based computerized tests to evaluate university students , 2009, Comput. Appl. Eng. Educ..
[35] Kazimierz Kowalski,et al. Continuous Biometric User Authentication in Online Examinations , 2010, 2010 Seventh International Conference on Information Technology: New Generations.
[36] Maria Papadaki,et al. Evaluation of anomaly-based IDS for mobile devices using machine learning classifiers , 2012, Secur. Commun. Networks.
[37] David Teneyuca. Internet cloud security: The illusion of inclusion , 2011, Inf. Secur. Tech. Rep..
[38] Gwo-Jen Hwang,et al. Criteria, Strategies and Research Issues of Context-Aware Ubiquitous Learning , 2008, J. Educ. Technol. Soc..
[39] Antonio Ruiz-Martínez,et al. A survey on solutions and main free tools for privacy enhancing Web communications , 2012, J. Netw. Comput. Appl..
[40] Frank Eliassen,et al. A development framework and methodology for self-adapting applications in ubiquitous computing environments , 2012, J. Syst. Softw..
[41] Jordi Herrera-Joancomartí,et al. A secure e-exam management system , 2006, First International Conference on Availability, Reliability and Security (ARES'06).
[42] Raphael Cohen-Almagor,et al. Fighting Hate and Bigotry on the Internet , 2011 .
[43] Qinghai Gao. Online teaching: Do you know who is taking the final exam? , 2010 .
[44] Hua Wang,et al. Secure and Efficient Information Sharing in Multi-university E-Learning Environments , 2007, ICWL.
[45] K. Titi,et al. Protecting E-courses Copyright in M-learning Process , 2009, 2009 International Conference on Future Computer and Communication.
[46] Sasan Adibi. A remote interactive non-repudiation multimedia-based m-learning system , 2010, Telematics Informatics.
[47] Georgios Kambourakis,et al. A PKI approach for deploying modern secure distributed e-learning and m-learning environments , 2007, Comput. Educ..
[48] Elke Franz,et al. Collaborative E-Learning , 2011, Digital Privacy - PRIME.
[49] Georgios Kambourakis,et al. User privacy and modern mobile services: are they on the same path? , 2012, Personal and Ubiquitous Computing.
[50] Yonghong Zhang,et al. Mobile learning with Bluetooth-based e-learning system , 2005, 2005 2nd Asia Pacific Conference on Mobile Technology, Applications and Systems.
[51] K. Rabuzin,et al. E-learning: Biometrics as a Security Factor , 2006, 2006 International Multi-Conference on Computing in the Global Information Technology - (ICCGI'06).
[52] Yongping Zhang,et al. An Optimized Scheme for Mobile Learning on IP-Based Network Using SIP , 2008, ICWL.
[53] Chonho Lee,et al. A survey of mobile cloud computing: architecture, applications, and approaches , 2013, Wirel. Commun. Mob. Comput..
[54] Yair Levy,et al. A Theoretical Approach for Biometrics Authentication of e-Exams , 2007 .
[55] Dimitrios Zissis,et al. Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..
[56] Sarah Jane Delany,et al. SMS spam filtering: Methods and data , 2012, Expert Syst. Appl..
[57] Inmaculada Plaza,et al. State of the art of frameworks and middleware for facilitating mobile and ubiquitous learning development , 2011, J. Syst. Softw..
[58] Ellen D. Wagner,et al. Realizing the promises of mobile learning , 2008, J. Comput. High. Educ..
[59] Stefanos Gritzalis,et al. How to protect security and privacy in the IoT: a policy-based RFID tag management protocol , 2014, Secur. Commun. Networks.
[60] Tammy Schellens,et al. Long-term study of safe Internet use of young children , 2011, Comput. Educ..
[61] Danco Davcev,et al. Mobile Cloud Computing Environment as a Support for Mobile Learning , 2012, CLOUD 2012.