2018
DOI: 10.13005/ojcst11.01.03
|View full text |Cite
|
Sign up to set email alerts
|

A New Model for Enhancing Computer Based Exam Authentication in KSA

Abstract: Nowadays, most of paper based exams are converted to computer based exams. Such conversion requires a significant robust security issues. The security issues are not limited to the authentication of the exam invigilators, and provided identification card. Improving the computer based exams is a challenging task, where focusing on user authentication ways is the main core to have a robust secure exams. This paper introduces a new methodology of authentication based on biometric iris recognition system for Qiya… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 3 publications
0
1
0
Order By: Relevance
“…The sharing identity which is known as gift identity occurs when a user is willing to share his /her credentials with other users. Finally, the denial identity occurs while the unauthorized user conducts illegal actions (Alkhateeb Jawad 2018).…”
Section: Theft Identity 2 Sharing Identity 3 Denial Identitymentioning
confidence: 99%
“…The sharing identity which is known as gift identity occurs when a user is willing to share his /her credentials with other users. Finally, the denial identity occurs while the unauthorized user conducts illegal actions (Alkhateeb Jawad 2018).…”
Section: Theft Identity 2 Sharing Identity 3 Denial Identitymentioning
confidence: 99%