scholarly journals User authentication system based on keystroke timing in e-learning settings

Author(s):  
Yoshinori Miyazaki ◽  
Akira Kouno
Author(s):  
Faizal Khan ◽  
Sultan Refa Alotaibi

The system based on formalized teaching with the help of electronic resources is called as E-learning. Using E-Learning in the university education systems has been growing rapidly based on the application of Information Technology (IT) designed for the substitute of traditional based learning approach. In terms of the E-learning based examinations, security constraints such as, identification of the user, misuse the passwords, unauthorized user instead of the authenticated one are available. Because of these disadvantages, the need of an authentication system is very important. The main challenge facing the security of E-learning environment is how to identify the unauthorized users from accessing and managing any platform. Therefore solving the problem of authenticating the valid user is very important. So, an intelligent examination system along with user authentication based on facial expression recognition is proposed in this paper. The proposed system can be classified in to three phases. The first phase is the design of facial database from the captured images. The second phase is the design of Artificial Intelligence (AI) based system for facial feature extraction and its classification using intelligent Agents. The final phase is the authentication of respective users by automatic identification of facial images. The results obtained shows that the proposed methodology has managed to validate the authenticated users and to provide an effective security in the E-learning platform.


Author(s):  
Akshay Valsaraj ◽  
Ithihas Madala ◽  
Nikhil Garg ◽  
Mohit Patil ◽  
Veeky Baths

Author(s):  
Harkeerat Bedi ◽  
Li Yang ◽  
Joseph M. Kizza

Fair exchange between a pair of parties can be defined as the fundamental concept of trade where none of the parties involved in the exchange have an unfair advantage over the other once the transaction completes. Fair exchange protocols are a group of protocols that provide means for accomplishing such fair exchanges. In this chapter we analyze one such protocol which offers means for fair contract signing, where two parties exchange their commitments over a pre-negotiated contract. We show that this protocol is not entirely fair and illustrate the possibilities of one party cheating by obtaining the other’s commitment and not providing theirs. We also analyze a revised version of this protocol which offers better fairness by handling many of the weaknesses. Both these protocols however fail to handle the possibilities of replay attacks where an intruder replays messages sent earlier from one party to the other. Our proposed protocol improves upon these protocols by addressing to the weaknesses which leads to such replay attacks. We implement a complete working system which provides fair contract signing along with properties like user authentication and efficient password management achieved by using a fingerprint based authentication system and features like confidentiality, data-integrity and non-repudiation accomplished through implementation of cryptographic algorithms based on elliptic curves.


Author(s):  
Simon Schwingel ◽  
Gottfried Vossen ◽  
Peter Westerkamp

E-learning environments and their system functionalities resemble one another to a large extent. Recent standardization efforts in e-learning concentrate on the reuse of learning material only, but not on the reuse of application or system functionalities. The LearnServe system, under development at the University of Muenster, builds on the assumption that a typical learning system is a collection of activities or processes that interact with learners and suitably chosen content, the latter in the form of learning objects. This enables us to divide the main functionality of an e-learning system into a number of stand-alone applications or services. The realization of these applications based on the emerging technical paradigm of Web services then renders a wide reuse of functionality possible, thereby giving learners a higher flexibility of choosing content and functionalities to be included in their learning environment. In such a scenario, it must be possible to maintain user identity and data across service and server boundaries. This chapter presents an architecture for implementing user authentication and the manipulation of user data across several Web services. In particular, it demonstrates how to exploit the SPML and SAML standards so that cross-domain single sign-on can be offered to the users of a service-based learning environment. The chapter also discusses how this is being integrated into LearnServe.


Sign in / Sign up

Export Citation Format

Share Document