International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Research Paper | Computer Science & Engineering | India | Volume 3 Issue 7, July 2014

Object Oriented Modeling of DSA for Authentication of Student in E-Learning

Ambalika Ghosh, Sunil Karforma

E-Learning is the interactive transfer of knowledge via an intranet or the internet. Due to use of internet as electronic communication media there are several types of risks & threats that may hamper security of E-learning environment. At the time of online submission of filling up form during any course registration by student, the authenticity and integrity of the information can be ensured using digital signature. To enhance the security level of the information the Digital Signature Algorithm (DSA) can be used to generate digital signature which will be an industry standard algorithm using public key cryptography for security of various electronic systems like E-Governance, E-Banking, E- Commerce etc. In this paper authors have applied DSA algorithm to achieve optimal resource allocation, faster information and enhanced security for authentication of information in E-Learning during submission of ICT (Information and Communication Technology) based filled up course registration form in Object Oriented paradigm.

Keywords: Digital Signature, DSA, Authentication, ICT, Object Oriented

Edition: Volume 3 Issue 7, July 2014

Pages: 2293 - 2297


How to Cite this Article?

Ambalika Ghosh, Sunil Karforma, "Object Oriented Modeling of DSA for Authentication of Student in E-Learning", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=201566, Volume 3 Issue 7, July 2014, 2293 - 2297

31 PDF Views | 28 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Digital Signature'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this article

Review Papers, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 1936 - 1939

Ensuring Efficient Data Transmission in Wireless Sensor Networks in Secure Way

D. Hemalatha, R. Arunudaya

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2334 - 2337

Providing Sender Anonymity with Message Authentication in Sensor Networks using Elliptic Curve Digital Signature Algorithm

Priya T V, Sreerag B M

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1220 - 1223

EAACK-An Innovative Intrusion Detection System for MANET using Digital Signature

Prof. G. M.Bhandari, Swati Pawar, Varsha Zaware, Ujjawala Bankar

Share this article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2631 - 2633

Intrusion Detection Techniques with Their Security Mechanisms for Mobile Ad Hoc Networks

Mr. Naveed Zishan, Ashwini Meshram

Share this article



Similar Articles with Keyword 'DSA'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2334 - 2337

Providing Sender Anonymity with Message Authentication in Sensor Networks using Elliptic Curve Digital Signature Algorithm

Priya T V, Sreerag B M

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 9, September 2016

Pages: 1201 - 1208

An Enhanced Secure Data Transfer using ECRSA - DSA with Deffie Hellman Key Exchange in Wireless Sensor Networks

Sindu.B, S. Sathya Priya

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1140 - 1143

Intrusion-Detection System for MANETs

S. Srihari Reddy, S. Z. Parveen

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 5 - 9

A Trusted Cryptography Key Framework for User Data Storage in Cloud Environment

Yogeswararao Gairaboina, Y. Siva Prasad

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2105 - 2111

EAACK ? To Overcome from Intruders Attacks in Manet?s by Providing Security Checks

H. Syed Siddiq, M. Hymavathi

Share this article



Similar Articles with Keyword 'Authentication'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1658 - 1660

A Review of Pairwise Key Establishment Techniques for Wireless Sensor Networks

Dinesh Dhakar, Ravi Khatri

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2644 - 2649

Misbehavior Packet Detection Approach using Effective Trust in Delay-Tolerant Networks

Prerana S. Jagadale, Prashant Jawalkar

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2927 - 2930

Incorporating Google Cloud Based Pub/Sub in Implementation of Identity Concentrated Encryption

Shilpashree K S, Harshavardhan L

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1548 - 1550

Survey on Distributed Mobile Cloud Computing Services: Signature Scheme for a Privacy-Aware Authentication

Chaitali P. Kathar, Vidya Dhamdhere

Share this article



Similar Articles with Keyword 'ICT'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2267 - 2274

Two Accounts of Solitude in Online Communal Networks

Alla Venu Gopal, G. Srinivasa Reddy

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 886 - 889

Survey on Algorithms Predicting Performance of Keyword Queries

Snehal Borole

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1486 - 1489

Mobile Based Marketing System Using Privacy and Security Aware Location Based Rewarding System

Digvijay A. Patil, Yogesh B. Gurav

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2319 - 2323

Performance Enhancement of a Transform Domain Based SteganographicTechnique Using Segmentation

Harjeet Kaur, Er Divya Goyal

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1422 - 1426

Incremental CFP-Tree Optimization For Efficient Representative Pattern Set Mining

Vivek Satpute, Prof. Digambar Padulkar

Share this article



Similar Articles with Keyword 'Object Oriented'

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 1797 - 1801

Tool for Converting Source Code to UML Diagrams & Measuring Object Oriented Metrics in OO Java Software

Shubhangi Sakore, Ravina Kudale

Share this article

Research Paper, Computer Science & Engineering, Ukraine, Volume 3 Issue 11, November 2014

Pages: 903 - 905

Binary Data Packing Method for Database Optimization

Yevgeniy Borodavka, Mykola Tsiutsiura

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 5, May 2017

Pages: 605 - 610

Survey on Object Oriented Mutation Testing

Snehal R. Takawale, Sandeep Kadam

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1977 - 1978

Application Aware Routing in SDN

Harishkumar Bhokare, Mansi Bhonsle

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 2293 - 2297

Object Oriented Modeling of DSA for Authentication of Student in E-Learning

Ambalika Ghosh, Sunil Karforma

Share this article
Top