Abstract
this article presents an encryption system which has many characteristics, like anonymity, originality, correctness, confidentiality, durability and confirmation as well as no need to any trusted authority. Besides that the submitted system gives an evidence of the successful submission by using anonymity property. Additional to use the anonymous return channel, also use the timed-based solution. The proposed system has been implemented and its results were measured. The preliminary findings in this paper seem very promising. Also, the results show that the system is applicable and will yield good results if applied to new generations of mobile phones. Furthermore, the results show that the method is more efficient and faster than the system already in place.
Highlights
In this time, teaching via the programmed systems have fall a new subject because the e-test is the tricky topic in e-learning systems
The proposed scheme employs the authentication protocol because it guarantees that cannot manipulate, where a holder of a secret key cannot award the key to others. This technique will allow to the new scheme to discover the fraud, since a private key is utilized in one test only and will destroy by itself
The alias is Built by the way that exam manger can check the identity of the participant, and the eligibility for taking the test or correcting the exam paper
Summary
In this time, teaching via the programmed systems have fall a new subject because the e-test is the tricky topic in e-learning systems. The proposed scheme employs the authentication protocol because it guarantees that cannot manipulate, where a holder of a secret key cannot award the key to others. This technique will allow to the new scheme to discover the fraud, since a private key is utilized in one test only and will destroy by itself. The student will receive the result and will be concerned on restoring his original id To educator this is not needful, his genuine id must continue confidential. In 2006, Jordi Castella-Roca et al [4] proposed an e-test scheme, includes three main participants, the exam manager, teacher and student. Many e-exam systems are available these days in the markets, but without illustration its security ranks and without mentioned anything about its application problems [5]
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Emerging Technologies in Learning (iJET)
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.