Research Paper | Computer Science & Engineering | India | Volume 3 Issue 7, July 2014
Object Oriented Modeling of DSA for Authentication of Student in E-Learning
Ambalika Ghosh, Sunil Karforma
E-Learning is the interactive transfer of knowledge via an intranet or the internet. Due to use of internet as electronic communication media there are several types of risks & threats that may hamper security of E-learning environment. At the time of online submission of filling up form during any course registration by student, the authenticity and integrity of the information can be ensured using digital signature. To enhance the security level of the information the Digital Signature Algorithm (DSA) can be used to generate digital signature which will be an industry standard algorithm using public key cryptography for security of various electronic systems like E-Governance, E-Banking, E- Commerce etc. In this paper authors have applied DSA algorithm to achieve optimal resource allocation, faster information and enhanced security for authentication of information in E-Learning during submission of ICT (Information and Communication Technology) based filled up course registration form in Object Oriented paradigm.
Keywords: Digital Signature, DSA, Authentication, ICT, Object Oriented
Edition: Volume 3 Issue 7, July 2014
Pages: 2293 - 2297
How to Cite this Article?
Ambalika Ghosh, Sunil Karforma, "Object Oriented Modeling of DSA for Authentication of Student in E-Learning", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=201566, Volume 3 Issue 7, July 2014, 2293 - 2297
132 PDF Views | 111 PDF Downloads
Similar Articles with Keyword 'Digital Signature'
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 1057 - 1058Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS
Pranita Prakash Kulkarni
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1069 - 1073Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN
Rucha Agrawal, Simran Khiani
Review Papers, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016
Pages: 1936 - 1939Ensuring Efficient Data Transmission in Wireless Sensor Networks in Secure Way
D. Hemalatha, R. Arunudaya
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 1220 - 1223EAACK-An Innovative Intrusion Detection System for MANET using Digital Signature
Prof. G. M.Bhandari, Swati Pawar, Varsha Zaware, Ujjawala Bankar
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015
Pages: 1324 - 1327Improving Security for Digital Signature by Using Steganography
G. Pranitha, Ch. Suman Chakravarthy
Similar Articles with Keyword 'DSA'
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1140 - 1143Intrusion-Detection System for MANETs
S. Srihari Reddy, S. Z. Parveen
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 2105 - 2111EAACK ? To Overcome from Intruders Attacks in Manet?s by Providing Security Checks
H. Syed Siddiq, M. Hymavathi
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 2334 - 2337Providing Sender Anonymity with Message Authentication in Sensor Networks using Elliptic Curve Digital Signature Algorithm
Priya T V, Sreerag B M
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 5 - 9A Trusted Cryptography Key Framework for User Data Storage in Cloud Environment
Yogeswararao Gairaboina, Y. Siva Prasad
Review Papers, Computer Science & Engineering, India, Volume 5 Issue 2, February 2016
Pages: 221 - 224A Review Paper on Preventing Forged Acknowledgement in Manets
Ajit N. Gedam, M. P. Wankhade
Similar Articles with Keyword 'Authentication'
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2406 - 2408Optimizing the Ad-Hoc Applications in Vehicular Network: A Study
Sumeet Sekhon, Dinesh Kumar
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 2234 - 2237Analysis of Protective Mechanism in Roaming Network for Secure Communication
Ashwini A. Lokhande, Sonali U. Nimbhorkar
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015
Pages: 1548 - 1550Survey on Distributed Mobile Cloud Computing Services: Signature Scheme for a Privacy-Aware Authentication
Chaitali P. Kathar, Vidya Dhamdhere
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 1845 - 1848A Cloud Storage System for Preserving Privacy and Data Integrity of User
M. S. Tore, S. K. Sonkar
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 2483 - 2487Accountability of Data usage in Cloud Computing
Nitin P. Doiphode, Hemlata Channe
Similar Articles with Keyword 'ICT'
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020
Pages: 457 - 461Artificial Intelligence for Hiring
Ishan Borker, Ashok Veda
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020
Pages: 1454 - 1458Heart Disease Prediction with Machine Learning Approaches
Megha Kamboj
Research Paper, Computer Science & Engineering, India, Volume 10 Issue 2, February 2021
Pages: 1669 - 1672Random Forest Based Heart Disease Prediction
Adeen, Preeti Sondhi
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2267 - 2274Two Accounts of Solitude in Online Communal Networks
Alla Venu Gopal, G. Srinivasa Reddy
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 886 - 889Survey on Algorithms Predicting Performance of Keyword Queries
Snehal Borole
Similar Articles with Keyword 'Object Oriented'
Research Paper, Computer Science & Engineering, Ukraine, Volume 3 Issue 11, November 2014
Pages: 903 - 905Binary Data Packing Method for Database Optimization
Yevgeniy Borodavka, Mykola Tsiutsiura
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016
Pages: 1797 - 1801Tool for Converting Source Code to UML Diagrams & Measuring Object Oriented Metrics in OO Java Software
Shubhangi Sakore, Ravina Kudale
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 2, February 2017
Pages: 1847 - 1849Design and Analysis of Dynamic OO Metric Tool for Java Project
Sherry Chalotra
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015
Pages: 1977 - 1978Application Aware Routing in SDN
Harishkumar Bhokare, Mansi Bhonsle
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 2293 - 2297Object Oriented Modeling of DSA for Authentication of Student in E-Learning
Ambalika Ghosh, Sunil Karforma