Efficient privacy-preserving anonymous authentication scheme for human predictive online education system
暂无分享,去创建一个
Mohammad S. Obaidat | Marimuthu Karuppiah | Pandi Vijayakumar | Maria Azees | Subramani Jegadeesan | P. Vijayakumar | M. Obaidat | Marimuthu Karuppiah | S. Jegadeesan | M. Azees
[1] Sharon Kerr,et al. Exploring the impact of artificial intelligence on teaching and learning in higher education , 2017, Research and Practice in Technology Enhanced Learning.
[2] John K. Tarus,et al. Challenges of implementing e-learning in Kenya: A case of Kenyan public universities , 2015 .
[3] Wanlei Zhou,et al. E-AUA: An Efficient Anonymous User Authentication Protocol for Mobile IoT , 2019, IEEE Internet of Things Journal.
[4] R. Saravanan,et al. A secure remote user mutual authentication scheme using smart cards , 2014, J. Inf. Secur. Appl..
[5] Rosemary Luckin,et al. Artificial intelligence and multimodal data in the service of human decision-making: A case study in debate tutoring , 2019, Br. J. Educ. Technol..
[6] Seoksoo Kim,et al. Towards a secure patient information access control in ubiquitous healthcare systems using identity-based signcryption , 2011, 13th International Conference on Advanced Communication Technology (ICACT2011).
[7] Xiaohui Liang,et al. Pseudonym Changing at Social Spots: An Effective Strategy for Location Privacy in VANETs , 2012, IEEE Transactions on Vehicular Technology.
[8] Mohammad S. Obaidat,et al. Security of e-Systems and Computer Networks , 2007 .
[9] R. Saravanan,et al. A Secure Authentication Scheme with User Anonymity for Roaming Service in Global Mobility Networks , 2015, Wirel. Pers. Commun..
[10] Sai Ji,et al. An efficient anonymous authentication and key agreement scheme with privacy-preserving for smart cities , 2021, Int. J. Distributed Sens. Networks.
[11] Chrysostomos D. Stylios,et al. Handling Privacy and Concurrency in an Online Educational Evaluation System , 2019 .
[12] Pin-Han Ho,et al. GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications , 2007, IEEE Transactions on Vehicular Technology.
[13] Mohammad S. Obaidat,et al. Efficient and Secure Anonymous Authentication With Location Privacy for IoT-Based WBANs , 2020, IEEE Transactions on Industrial Informatics.
[14] Imran Memon,et al. Enhanced Privacy and Authentication: An Efficient and Secure Anonymous Communication for Location Based Service Using Asymmetric Cryptography Scheme , 2015, Wirel. Pers. Commun..
[15] Liehuang Zhu,et al. LESPP: lightweight and efficient strong privacy preserving authentication scheme for secure VANET communication , 2014, Computing.
[16] Kefei Chen,et al. An Adaptive Stable Link Selection Algorithm for Mobile Ad Hoc Networks , 2007 .
[17] Duncan S. Wong,et al. Certificateless Public-Key Signature: Security Model and Efficient Construction , 2006, ACNS.
[18] Lauren I. Labrecque,et al. Addressing Online Behavioral Advertising and Privacy Implications: A Comparison of Passive Versus Active Learning Approaches , 2019, Journal of Marketing Education.
[19] Muhammad Khurram Khan,et al. A more secure and privacy-aware anonymous user authentication scheme for distributed mobile cloud computing environments , 2016, Secur. Commun. Networks.
[20] Sunil Karforma,et al. Risks and remedies in e-learning system , 2012, ArXiv.
[21] D. Boneh,et al. Short Signatures from the Weil Pairing , 2001, Journal of Cryptology.
[22] Wenyong Wang,et al. A Secure Mutual Batch Authentication Scheme for Patient Data Privacy Preserving in WBAN , 2019, Sensors.
[23] Mohamed Munser Saleh. A Review of Security Threats by The Unauthorized in The E-Learning , 2015 .
[24] Xiaodong Lin,et al. A Threshold Anonymous Authentication Protocol for VANETs , 2016, IEEE Transactions on Vehicular Technology.
[25] Kyung Sup Kwak,et al. Certificateless Remote Anonymous Authentication Schemes for WirelessBody Area Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.
[26] Xiaofeng Liao,et al. Body Area Network Security: A Fuzzy Attribute-Based Signcryption Scheme , 2013, IEEE Journal on Selected Areas in Communications.
[27] Liehui Jiang,et al. Secure and Efficient User Authentication Scheme Based on Password and Smart Card for Multiserver Environment , 2018, Secur. Commun. Networks.
[28] Aarti Amod Agarkar,et al. LRSPPP: lightweight R-LWE-based secure and privacy-preserving scheme for prosumer side network in smart grid , 2019, Heliyon.
[29] Samy S. Abu Naser,et al. An intelligent tutoring system for teaching advanced topics in information security , 2016 .
[30] Victor I. Chang,et al. Computationally efficient privacy preserving authentication and key distribution techniques for vehicular ad hoc networks , 2017, Cluster Computing.
[31] An Braeken,et al. eDAAAS: Efficient distributed anonymous authentication and access in smart homes , 2016, Int. J. Distributed Sens. Networks.
[32] Kenneth G. Paterson,et al. Certificateless Public Key Cryptography , 2003 .
[33] Rytis Maskeliunas,et al. Artificial Intelligence, Smart Classrooms and Online Education in the 21st Century: Implications for Human Development , 2019, J. Cases Inf. Technol..
[34] Alison A. Carr-Chellman,et al. Motivations for Residential Students to Participate in Online Courses , 2009 .
[35] Anand Nayyar,et al. An efficient anonymous authentication and confidentiality preservation schemes for secure communications in wireless body area networks , 2021, Wireless Networks.
[36] Kwangjo Kim,et al. A New ID-based Group Signature Scheme from Bilinear Pairings , 2003, IACR Cryptol. ePrint Arch..
[37] Victor I. Chang,et al. Computationally efficient privacy preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks , 2018, Future Gener. Comput. Syst..