Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Secure E-Learning and Cryptography

Secure E-Learning and Cryptography
View Sample PDF
Author(s): Wasim A. Al-Hamdani (Kentucky State University, USA)
Copyright: 2014
Pages: 39
Source title: Cases on Professional Distance Education Degree Programs and Practices: Successes, Challenges, and Issues
Source Author(s)/Editor(s): Kirk P.H. Sullivan (Umeå University, Sweden), Peter E. Czigler (Örebro University, Sweden) and Jenny M. Sullivan Hellgren (Umeå University, Sweden)
DOI: 10.4018/978-1-4666-4486-1.ch012


View Secure E-Learning and Cryptography on the publisher's website for pricing and purchasing information.


This chapter investigates the problem of secure e-learning and the use cryptography algorithms as tools to ensure integrity, confidentiality, non-reputations, authentication, and access control to provide secure knowledge delivery, secure student feedback, and secure assessments. Providing privacy in e-learning focuses on the protection of personal information of a learner in an e-learning system, while secure e-learning focuses on complete, secure environments to provide integrity, confidentiality, authentication, authorization, and proof of origin. The secure e-learning system and the use of cryptography is the main theme of this chapter. In addition, the authors present a new cryptograph e-learning model based on PKI and cryptography access control. The model is based on creating secure shell system based on PKI, and each adding block has to certified itself to be assessable.

Related Content

Frederic Fovet. © 2022. 20 pages.
Mariette Herro. © 2022. 16 pages.
Lori B. McEwen, Julie A. Foss. © 2022. 15 pages.
Aimee L. Whiteside, April Fleetwood. © 2022. 9 pages.
Kristen Carlson. © 2022. 12 pages.
Mario Andrade. © 2022. 16 pages.
Lauren M. Kaufman. © 2022. 21 pages.
Body Bottom