Object Oriented Modeling of DSA for Authentication of Student in E-Learning
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 7, July 2014

Object Oriented Modeling of DSA for Authentication of Student in E-Learning

Ambalika Ghosh, Sunil Karforma

E-Learning is the interactive transfer of knowledge via an intranet or the internet. Due to use of internet as electronic communication media there are several types of risks & threats that may hamper security of E-learning environment. At the time of online submission of filling up form during any course registration by student, the authenticity and integrity of the information can be ensured using digital signature. To enhance the security level of the information the Digital Signature Algorithm (DSA) can be used to generate digital signature which will be an industry standard algorithm using public key cryptography for security of various electronic systems like E-Governance, E-Banking, E- Commerce etc. In this paper authors have applied DSA algorithm to achieve optimal resource allocation, faster information and enhanced security for authentication of information in E-Learning during submission of ICT (Information and Communication Technology) based filled up course registration form in Object Oriented paradigm.

Keywords: Digital Signature, DSA, Authentication, ICT, Object Oriented

Edition: Volume 3 Issue 7, July 2014

Pages: 2293 - 2297

Share this Article

How to Cite this Article?

Ambalika Ghosh, Sunil Karforma, "Object Oriented Modeling of DSA for Authentication of Student in E-Learning", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=201566, Volume 3 Issue 7, July 2014, 2293 - 2297

89 PDF Views | 71 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Digital Signature'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1057 - 1058

Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANET'S

Pranita Prakash Kulkarni

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1475 - 1480

Secure Digital Signature Scheme against Chosen Message Attacks

Maheshkumar Zilla, K. Raghavendra Rao

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1220 - 1223

EAACK-An Innovative Intrusion Detection System for MANET using Digital Signature

Prof. G. M.Bhandari, Swati Pawar, Varsha Zaware, Ujjawala Bankar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2334 - 2337

Providing Sender Anonymity with Message Authentication in Sensor Networks using Elliptic Curve Digital Signature Algorithm

Priya T V, Sreerag B M

Share this Article

Similar Articles with Keyword 'DSA'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2334 - 2337

Providing Sender Anonymity with Message Authentication in Sensor Networks using Elliptic Curve Digital Signature Algorithm

Priya T V, Sreerag B M

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2105 - 2111

EAACK ? To Overcome from Intruders Attacks in Manet?s by Providing Security Checks

H. Syed Siddiq, M. Hymavathi

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1140 - 1143

Intrusion-Detection System for MANETs

S. Srihari Reddy, S. Z. Parveen

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 5 - 9

A Trusted Cryptography Key Framework for User Data Storage in Cloud Environment

Yogeswararao Gairaboina, Y. Siva Prasad

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 5 Issue 2, February 2016

Pages: 221 - 224

A Review Paper on Preventing Forged Acknowledgement in Manets

Ajit N. Gedam, M. P. Wankhade

Share this Article

Similar Articles with Keyword 'Authentication'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1724 - 1727

Privacy Preserving Authenticity Framework for Shared Data Cloud Network

P. Vanitha Sree, K. Narayana Rao

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2483 - 2487

Accountability of Data usage in Cloud Computing

Nitin P. Doiphode, Hemlata Channe

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1944 - 1947

Design and Implementation of Tarf for WSNs

Kavita, Amareshwari Patil

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2535 - 2538

A Survey on Security Mechanism using Colors and Armstrong Numbers

Nutan Gurav, Pratap Singh

Share this Article

Similar Articles with Keyword 'ICT'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 1454 - 1458

Heart Disease Prediction with Machine Learning Approaches

Megha Kamboj

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 470 - 478

Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT

Aditya Tiwari, Ayush Pandey

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2267 - 2274

Two Accounts of Solitude in Online Communal Networks

Alla Venu Gopal, G. Srinivasa Reddy

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 457 - 461

Artificial Intelligence for Hiring

Ishan Borker, Ashok Veda

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 886 - 889

Survey on Algorithms Predicting Performance of Keyword Queries

Snehal Borole

Share this Article

Similar Articles with Keyword 'Object Oriented'

Research Paper, Computer Science & Engineering, Ukraine, Volume 3 Issue 11, November 2014

Pages: 903 - 905

Binary Data Packing Method for Database Optimization

Yevgeniy Borodavka, Mykola Tsiutsiura

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1977 - 1978

Application Aware Routing in SDN

Harishkumar Bhokare, Mansi Bhonsle

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 1797 - 1801

Tool for Converting Source Code to UML Diagrams & Measuring Object Oriented Metrics in OO Java Software

Shubhangi Sakore, Ravina Kudale

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 2, February 2017

Pages: 1847 - 1849

Design and Analysis of Dynamic OO Metric Tool for Java Project

Sherry Chalotra

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 2293 - 2297

Object Oriented Modeling of DSA for Authentication of Student in E-Learning

Ambalika Ghosh, Sunil Karforma

Share this Article
Top