2012
DOI: 10.1080/09720529.2012.10698388
|View full text |Cite
|
Sign up to set email alerts
|

Web-based-secure online non-choice –based examination system (wones) using cryptography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 3 publications
0
6
0
Order By: Relevance
“…Yang [51] Guzman [57] Rashad [58] Vasupongayya [59] Sheshadri [60] Chang [49] Lu [52] Zhai [53] Henke [54] Kaya [50] Younis [ QSP experiences two-phase encryption in order to prevent unethical access before the exam. Moreover, a restriction of time is issued in the proposed scheme so that every minion has to wait for system permission in order to initiate the decryption process of QSP.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Yang [51] Guzman [57] Rashad [58] Vasupongayya [59] Sheshadri [60] Chang [49] Lu [52] Zhai [53] Henke [54] Kaya [50] Younis [ QSP experiences two-phase encryption in order to prevent unethical access before the exam. Moreover, a restriction of time is issued in the proposed scheme so that every minion has to wait for system permission in order to initiate the decryption process of QSP.…”
Section: Discussionmentioning
confidence: 99%
“…A comparative study between BSSSQS and existing models, such as Chang et al [49], Kaya et. al [50], Yang [51], Lu et al [52], Zhai et al [53], Guzman et al [57], Henke [54], Rashad et al [58], Vasupongayya et al [59], Sheshadri et al [60], Younis et al [55], is provided in Table 2 by considering the following features to compare the proposed BSSSQS with the existing examination management system models.…”
Section: Performance Comparisonmentioning
confidence: 99%
“…Many researchers proposed a number of online examination systems such as SIETTE [18], WETAS [19], EMS [20],WONES [21] and CBTS [22]. A number of application results using other open source programming languages such as PHP and MySQL can be found in [23], [24], [25], [26].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Data security is a very urgent matter and should be guaranteed in online systems that utilize public networks. Therefore, there is a need to think of a security system that can be simple for the user but on the other hand becomes hard or even impenetrable for unauthorized persons [7].…”
Section: Introductionmentioning
confidence: 99%