Transparent Authentication Methodology in Electronic Education
暂无分享,去创建一个
Gary Wills | Richard M. Crowder | David Argles | Nawfal F. Fadhel | G. Wills | R. Crowder | David Argles
[1] Gary B. Wills,et al. Towards security goals in summative e-assessment security , 2009, 2009 International Conference for Internet Technology and Secured Transactions, (ICITST).
[2] Tyler Robison,et al. Controlling Transparency in an Online Learning Environment , 2007, IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC 2007).
[3] Charles A. Shoniregun,et al. Applying semantic web and user behavior analysis to enforce the intrusion detection system , 2009, 2009 International Conference for Internet Technology and Secured Transactions, (ICITST).
[4] Huaiqing Wang,et al. Cyber warfare: steganography vs. steganalysis , 2004, CACM.
[5] Sushil Jajodia,et al. Exploring steganography: Seeing the unseen , 1998, Computer.
[6] Chin-Chen Chang,et al. Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy , 2003, Pattern Recognit..
[7] A. P. Rovai. Building classroom community at a distance: A case study , 2001 .
[8] Hideyuki Tokuda,et al. Active Authentication for Pervasive Computing Environments , 2002, ISSS.
[9] Rashad J. Rasras,et al. Advanced algorithms in audio steganography for hiding human speech signal , 2010, 2010 2nd International Conference on Advanced Computer Control.
[10] Suthikshn Kumar. Steganographic Approach to Copyright Protection of Audio , 2007 .
[11] Bridget D. Arend. Encouraging Critical Thinking in Online Threaded Discussions. , 2009 .
[12] K. Faez,et al. LSB data hiding detection based on gray level co-occurrence matrix (GLCM) , 2008, 2008 International Symposium on Telecommunications.
[13] Toby Sharp,et al. An Implementation of Key-Based Digital Signal Steganography , 2001, Information Hiding.
[14] Martín Abadi,et al. A logic of authentication , 1990, TOCS.
[15] John C. Mitchell,et al. Client-Side Defense Against Web-Based Identity Theft , 2004, NDSS.
[16] David Argles,et al. Transparent authentication in E-learning , 2011, International Conference on Information Society (i-Society 2011).
[17] E.G. Agulla,et al. Is My Student at the Other Side? Applying Biometric Web Authentication to E-Learning Environments , 2008, 2008 Eighth IEEE International Conference on Advanced Learning Technologies.
[18] Brian J. Cook,et al. Full Disclosure: The Perils and Promise of Transparency , 2007, Perspectives on Politics.
[19] D. Weil,et al. Full disclosure : the perils and promise of transparency , 2007 .
[20] Akram M. Zeki,et al. A secure audio steganography approach , 2009, 2009 International Conference for Internet Technology and Secured Transactions, (ICITST).
[22] Sugandha Gupta. A Comparative study of Usability Evaluation Methods , 2015 .
[23] L. Bingham. Full Disclosure: The Perils and Promise of Transparency, by Archon Fung, Mary Graham, and David Weil, Cambridge: Cambridge University Press, 2007, 282 pp., $28.00, hardcover. , 2008 .
[24] Julio Cesar Sampaio do Prado Leite,et al. Software Transparency , 2010, Bus. Inf. Syst. Eng..
[25] Adrian Henriques,et al. Corporate Truth: The Limits to Transparency , 2013 .
[26] Zhiping Zhou,et al. Steganalysis for Markov Feature of Difference Array in DCT Domain , 2009, 2009 Sixth International Conference on Fuzzy Systems and Knowledge Discovery.
[27] Chula G. King,et al. Online Exams and Cheating: An Empirical Analysis of Business Students' Views , 2009 .
[28] Sacha Brostoff,et al. Transforming the ‘Weakest Link’ — a Human/Computer Interaction Approach to Usable and Effective Security , 2001 .
[29] 김인택. [서평]「Information Hiding Techniques for Steganography and Digital Watermarking」 , 2000 .
[30] Chu-Hsing Lin,et al. A Robust Watermark Scheme for Copyright Protection , 2008, 2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008).
[31] Wen-Nung Lie,et al. Data hiding in images with adaptive numbers of least significant bits based on the human visual system , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).
[32] D. Artz,et al. Digital steganography: hiding data within data , 2001 .