Tài liệu tham khảo |
Loại |
Chi tiết |
[2] N. H. M. Alwi and Ip-Shing Fan, “Information security management in e- learning,” no. July 2015, pp. 1–6, 2014 |
Sách, tạp chí |
Tiêu đề: |
Information security management in e-learning |
|
[3] A. Moini and A. M. Madni, “Leveraging biometrics for user authentication in online learning: A systems perspective,” IEEE Systems Journal, vol. 3, no. 4, pp. 469–476, 2009 |
Sách, tạp chí |
Tiêu đề: |
Leveraging biometrics for user authentication inonline learning: A systems perspective,” "IEEE Systems Journal |
|
[4] M. L. Das, A. Saxena, and V. P. Gulati, “A dynamic ID-based remote user authentication scheme,” IEEE Transactions on Consumer Electronics, vol. 50, no. 2, pp. 629–631, 2004 |
Sách, tạp chí |
Tiêu đề: |
A dynamic ID-based remote userauthentication scheme,” "IEEE Transactions on Consumer Electronics |
|
[5] H. Jiang, “Strong password authentication protocols,” ICDLE 2010 - 2010 4th International Conference on Distance Learning and Education, Proceedings, pp. 50–52, 2010 |
Sách, tạp chí |
Tiêu đề: |
Strong password authentication protocols,” "ICDLE 2010 - 2010 4thInternational Conference on Distance Learning and Education, Proceedings |
|
[6] A. Almulhem, “A graphical password authentication system,” in 2011 World Congress on Internet Security (WorldCIS-2011), Feb 2011, pp. 223–225 |
Sách, tạp chí |
Tiêu đề: |
A graphical password authentication system,” in "2011 WorldCongress on Internet Security (WorldCIS-2011) |
|
[7] S. M. Gurav, L. S. Gawade, P. K. Rane, and N. R. Khochare, “Graphical password authentication: Cloud securing scheme,” in 2014 International Con- ference on Electronic Systems, Signal Processing and Computing Technologies, Jan 2014, pp. 479–483 |
Sách, tạp chí |
Tiêu đề: |
Graphicalpassword authentication: Cloud securing scheme,” in "2014 International Con-ference on Electronic Systems, Signal Processing and Computing Technologies |
|
[10] Z. Zheng, X. Liu, L. Yin, and Z. Liu, “A hybrid password authentication scheme based on shape and text,” Journal of Computers, vol. 5, no. 5, pp.765–772, 2010 |
Sách, tạp chí |
Tiêu đề: |
A hybrid password authenticationscheme based on shape and text,” "Journal of Computers |
|
[12] S. Schechter, A. J. Brush, and S. Egelman, “It’s no secret Measuring the security and reliability of authentication via ’secret’ questions,” Proceedings - IEEE Symposium on Security and Privacy, pp. 375–390, 2009 |
Sách, tạp chí |
Tiêu đề: |
It’s no secret Measuring thesecurity and reliability of authentication via ’secret’ questions,” "Proceedings -IEEE Symposium on Security and Privacy |
|
[13] F. Towhidi, A. A. Manaf, S. M. Daud, and A. H. Lashkari, “The Knowledge Based Authentication Attacks,” 2011 |
Sách, tạp chí |
Tiêu đề: |
The KnowledgeBased Authentication Attacks |
|
[14] K. Skraˇ ci´ c, P. Pale, and B. Jeren, “Knowledge based authentication require- ments,” in 2013 36th International Convention on Information and Commu- nication Technology, Electronics and Microelectronics (MIPRO), May 2013, pp. 1116–1120 |
Sách, tạp chí |
Tiêu đề: |
Knowledge based authentication require-ments,” in "2013 36th International Convention on Information and Commu-nication Technology, Electronics and Microelectronics (MIPRO) |
|
[15] K. Apampa, G. Wills, and D. Argles, “An approach to presence verification in summative e-assessment security,” Information Society (i-Society), pp.647–651, 2010 |
Sách, tạp chí |
Tiêu đề: |
An approach to presence verificationin summative e-assessment security,” "Information Society (i-Society) |
|
[16] A. A. Elwahab, A. M. Eldin, A. M. Wahba, and M. A. Sheirah, “A security layer for smart card applications authentication,” Proceedings - The 2009 International Conference on Computer Engineering and Systems, ICCES’09, pp. 514–517, 2009 |
Sách, tạp chí |
Tiêu đề: |
A securitylayer for smart card applications authentication,” "Proceedings - The 2009International Conference on Computer Engineering and Systems, ICCES’09 |
|
[17] S. Ajay Kumar, K. Ashish, and G. Tarun, “Survey of Remote User Password Authentication Scheme Using Smart Cards,” International Journal of Advanced Research, vol. 3, no. 4, 2015 |
Sách, tạp chí |
Tiêu đề: |
Survey of Remote User PasswordAuthentication Scheme Using Smart Cards,”"International Journal of AdvancedResearch |
|
[18] A. G. Jadhao and S. P. Ugale, “Study of rfid authentication protocols,” in 2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA), Aug 2018, pp. 1–4 |
Sách, tạp chí |
Tiêu đề: |
Study of rfid authentication protocols,” in"2018 Fourth International Conference on Computing Communication Controland Automation (ICCUBEA) |
|
[19] P. D’Arco and A. Santis, “Weaknesses in a recent ultra-lightweight rfid au- thentication protocol,” vol. 5023, 06 2008, pp. 27–39 |
Sách, tạp chí |
Tiêu đề: |
Weaknesses in a recent ultra-lightweight rfid au-thentication protocol |
|
[20] S. Asha and C. Chellappan, “Authentication of e-learners using multimodal bometric technology,” IEEE- International Symposium on Biometrics and Security Technologies, ISBAST’08, 2008 |
Sách, tạp chí |
Tiêu đề: |
Authentication of e-learners using multimodalbometric technology,” "IEEE- International Symposium on Biometrics andSecurity Technologies, ISBAST’08 |
|
[21] C. Gil, M. Castro, and M. Wyne, “Identification in web evaluation in learn- ing management system by fingerprint identification system,” Proceedings - Frontiers in Education Conference, FIE, pp. 1–6, 2010 |
Sách, tạp chí |
Tiêu đề: |
Identification in web evaluation in learn-ing management system by fingerprint identification system,” "Proceedings -Frontiers in Education Conference, FIE |
|
1–7, 2009. [Online]. Available: http://web.csulb.edu/{~}arezaei/ETEC551/web/LMS{_}fieldguide{_}20091.pdf |
Link |
|
[52] Ethereum. (2018) Ethereum: White paper. [Online]. Available: https://github.com/ethereum/wiki/wiki/White-Paper |
Link |
|
[54] ——. (2018) Introduction to smart contracts. [Online]. Available: https://solidity.readthedocs.io/en/v0.4.22/introduction-to-smart-contracts.html[55] Y. Chen, H. Li, K. Li, and J. Zhang, “An improved p2p file system scheme |
Link |
|