Secure E-Exam Scheme
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | United Kingdom | Volume 3 Issue 9, September 2014

Secure E-Exam Scheme

Sattar J. Aboud

Secure e-exam is one of the considerable difficult problems in e-learning environment. The exam process for any educational university should involve different security techniques that should be used to protect the exam characteristics in diverse phases. In this paper, we propose a secure e-exam scheme with all of its information is in digital form. We present a system that has to be implemented to get a high standard security.

Keywords: e-learning, e-exam, encryption scheme

Edition: Volume 3 Issue 9, September 2014

Pages: 2200 - 2203

Share this Article

How to Cite this Article?

Sattar J. Aboud, "Secure E-Exam Scheme", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SEP14623, Volume 3 Issue 9, September 2014, 2200 - 2203

72 PDF Views | 56 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'e-learning'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020

Pages: 1626 - 1628

Image Noise Reduction with Autoencoder using Tensor Flow

Jai Sehgal, Dr Yojna Arora

Share this Article

Research Paper, Computer Science & Engineering, United Kingdom, Volume 3 Issue 9, September 2014

Pages: 2200 - 2203

Secure E-Exam Scheme

Sattar J. Aboud

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2681 - 2688

A Proposed Framework Using Neural Network in Web Mining for Improving the Performance of E-Learning System

Dar Masroof Amin, Atul Garg

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 1303 - 1305

Challenges in Cloud Computing: Enabling the Future Internet of Services

Yogesh Dumbare, S. A. Kahate

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 3, March 2017

Pages: 1676 - 1678

Role of Knowledge Management in Higher Education

Anil Kumar Pandey

Share this Article

Similar Articles with Keyword 'e-exam'

Research Paper, Computer Science & Engineering, United Kingdom, Volume 3 Issue 9, September 2014

Pages: 2200 - 2203

Secure E-Exam Scheme

Sattar J. Aboud

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2931 - 2934

Evaluate and Identify the Age Related Complications Behind the Failure of Iris Based Recognition System

Namrata, Shekhar Sengar

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 721 - 723

Techniques for Duplicate Detection in Hierarchical Data

Suvarna Kale, Basha Vankudothu

Share this Article

Similar Articles with Keyword 'encryption scheme'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1330 - 1335

Efficient Image Encryption EIE - Compression System Using Haar Wavelets Using Matlab

Kavita, Anil Vadhwa

Share this Article

Research Paper, Computer Science & Engineering, United Kingdom, Volume 3 Issue 9, September 2014

Pages: 2200 - 2203

Secure E-Exam Scheme

Sattar J. Aboud

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 3169 - 3172

A Survey on Secure Data Sharing and Collaboration Approaches in Cloud Computing

Prajakta Solapurkar, Girish Potdar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1122 - 1125

Improving Security of Traceable White-Box CPABE with TTP Access Control

Dilu Anil

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1074 - 1077

A Secure and Efficient Way of Accessing Encrypted Cloud Databases Using Adaptive Encryption Scheme

Seethal K S, Siddana Gowda

Share this Article
Top