Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2015, Article ID 878327, 6 pages
Research Article

Security Enhancement Using Cache Based Reauthentication in WiMAX Based E-Learning System

1Department of Information Technology, K. S. Rangasamy College of Technology, Thiruchengode, Namakkal, Tamil Nadu 637 215, India
2Department of Computer Science and Engineering, KSR Institute for Engineering and Technology, Thiruchengode, Namakkal, Tamil Nadu 637 215, India

Received 17 April 2015; Revised 17 July 2015; Accepted 28 July 2015

Academic Editor: Gian Luca Marcialis

Copyright © 2015 Chithra Rajagopal and Kalaavathi Bhuvaneshwaran. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. IEEE 802.16 Working Group, “IEEE standard for local and metropolitan area networks, part 16: air interface for fixed broadband wireless access systems,” IEEE Standard 802.16-2004, 2004. View at Google Scholar
  2. IEEE 802.16 Working Group, “IEEE Standard for Local and Metropolitan Area Networks, part 16: air interface for fixed and mobile broadband wireless access systems, amendment 2: physical and medium access control layers for combined fixed and mobile operation in licensed bands,” IEEE Standard 802.16e-2005, 2006. View at Google Scholar
  3. C. Floyd, T. Schultz, and S. Fulton, “United States Air Force Academy Security Vulnerabilities in the open source Moodle eLearning system,” in Proceedings of the 16th Colloquium for Information Systems Security Education, Lake Buena Vista, Fla, USA, June 2012.
  4. K. Palanivel and S. Kuppuswami, “A scalable reference architecture to personalized E-learning systems using SOA,” International Journal of Advanced Technology & Engineering Research, vol. 144, 2014. View at Google Scholar
  5. K. Palanivel and S. Kuppuswami, “Reference architecture for personalized E-learning systems using proxy and caching (RAPESPAC),” International Journal of Computer Applications, vol. 38, no. 10, pp. 17–26, 2012. View at Publisher · View at Google Scholar
  6. S. Asha and C. Chellappan, “Authentication of e-learners using multimodal biometric technology,” in Proceedings of the IEEE International Symposium on Biometrics and Security Technologies, 2008.
  7. A. Ullah, H. Xiao, and M. Lilley, “Profile based student authentication in online examination,” in Proceedings of the International Conference on Information Society (i-Society '12), pp. 109–113, IEEE, London, UK, June 2012. View at Scopus
  8. K. M. Apampa, G. Wills, and D. Argles, “An approach to presence verification in summative e-assessment security,” in Proceedings of the International Conference on Information Society (i-Society '10), pp. 647–651, June 2010. View at Scopus
  9. C. Rajagopal and K. Bhuvaneshwaran, “Secured session based authentication protocol for E-learning using WiMAX networks,” International Journal of Advancements in Computing Technology, In press.
  11. S. M. Ross, Stochastic Processes, Wiley, Hoboken, NJ, USA, 1996.