{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T22:25:28Z","timestamp":1767651928627,"version":"3.37.3"},"reference-count":55,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2020,1,18]],"date-time":"2020-01-18T00:00:00Z","timestamp":1579305600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,18]],"date-time":"2020-01-18T00:00:00Z","timestamp":1579305600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572434,91630206"],"award-info":[{"award-number":["61572434,91630206"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003399","name":"Science and Technology Commission of Shanghai Municipality","doi-asserted-by":"publisher","award":["16DZ2293600"],"award-info":[{"award-number":["16DZ2293600"]}],"id":[{"id":"10.13039\/501100003399","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2023,4]]},"DOI":"10.1007\/s11036-019-01429-x","type":"journal-article","created":{"date-parts":[[2020,1,18]],"date-time":"2020-01-18T19:02:15Z","timestamp":1579374135000},"page":"673-689","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Fog-Assisted Secure Data Exchange for Examination and Testing in E-learning System"],"prefix":"10.1007","volume":"28","author":[{"given":"Samina","family":"Kausar","sequence":"first","affiliation":[]},{"given":"Xu","family":"Huahu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3603-1709","authenticated-orcid":false,"given":"Ata","family":"Ullah","sequence":"additional","affiliation":[]},{"given":"Zhu","family":"Wenhao","sequence":"additional","affiliation":[]},{"given":"Muhammad Yasir","family":"Shabir","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,18]]},"reference":[{"key":"1429_CR1","doi-asserted-by":"publisher","first-page":"2615","DOI":"10.1109\/ACCESS.2017.2668840","volume":"5","author":"R Mehmood","year":"2017","unstructured":"Mehmood R, Alam F, Albogami N, Katib I, Albeshri A, Altowaijri S (2017) UTiLearn: a personalised ubiquitous teaching and learning system for smart societies. IEEE Access 5:2615\u20132635","journal-title":"IEEE Access"},{"key":"1429_CR2","volume-title":"Smart infrastructure and applications: foundations for smarter cities and societies","author":"R Mehmood","year":"2019","unstructured":"Mehmood R, See S, Katib I, Chlamtac I (2019) Smart infrastructure and applications: foundations for smarter cities and societies. Springer, Cham, Switzerland"},{"key":"1429_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-94180-6","volume-title":"Smart societies infrastructure technologies and applications","author":"R Mehmood","year":"2018","unstructured":"Mehmood R, Bhaduri B, Katib I, Chlamtac I (2018) Smart societies infrastructure technologies and applications, vol 224. Springer, Cham, Switzerland"},{"issue":"5","key":"1429_CR4","first-page":"108","volume":"14","author":"Y Chen","year":"2013","unstructured":"Chen Y, He W (2013) Security risks and protection in online learning: a survey. Int Rev Res Open Dist Learn 14(5):108\u2013127","journal-title":"Int Rev Res Open Dist Learn"},{"key":"1429_CR5","doi-asserted-by":"publisher","first-page":"9533","DOI":"10.1109\/ACCESS.2017.2697839","volume":"5","author":"F Alam","year":"2017","unstructured":"Alam F, Mehmood R, Katib I, Albogami N, Albeshri A (2017) Data fusion and IoT for smart ubiquitous environments: a survey. IEEE Access 5:9533\u20139554","journal-title":"IEEE Access"},{"key":"1429_CR6","doi-asserted-by":"crossref","unstructured":"Stergiou C, Plageras A, Psannis KE, Gupta B (2019) Secure machine learning scenario from big data in cloud computing via internet of things network. Springer, Handbook of Computer Networks and Cyber Security: Principles and Paradigms, Multimedia Systems and Applications","DOI":"10.1007\/978-3-030-22277-2_21"},{"key":"1429_CR7","doi-asserted-by":"publisher","first-page":"37","DOI":"10.3991\/ijet.v8iS1.2344","volume":"8","author":"E-SH Farouk","year":"2013","unstructured":"Farouk E-SH, Al TA, Alghatani K, El-Seoud AS (2013) The impact of cloud computing technologies in E-learning. International Journal of Emerging Technologies in Learning (iJET) 8:37\u201343","journal-title":"International Journal of Emerging Technologies in Learning (iJET)"},{"key":"1429_CR8","doi-asserted-by":"publisher","first-page":"32258","DOI":"10.1109\/ACCESS.2018.2846609","volume":"6","author":"T Muhammed","year":"2018","unstructured":"Muhammed T, Mehmood R, Albeshri A, Katib I (2018) UbeHealth: a personalized ubiquitous cloud and edge-enabled networked healthcare system for smart cities. IEEE Access 6:32258\u201332285","journal-title":"IEEE Access"},{"issue":"6","key":"1429_CR9","doi-asserted-by":"publisher","first-page":"854","DOI":"10.1109\/JIOT.2016.2584538","volume":"3","author":"M Chiang","year":"2016","unstructured":"Chiang M, Zhang T (2016) Fog and IoT: an overview of research opportunities. IEEE Internet Things J 3(6):854\u2013864","journal-title":"IEEE Internet Things J"},{"issue":"2","key":"1429_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/bdcc2020010","volume":"2","author":"H Atlam","year":"2018","unstructured":"Atlam H, Walters R, Wills G (2018) Fog computing and the internet of things: a review. Big Data Cognit Comput 2(2):1\u201318","journal-title":"Big Data Cognit Comput"},{"key":"1429_CR11","doi-asserted-by":"crossref","unstructured":"Ullah A, Xiao H, Lilley M, Barker T (2014) Privacy and usability of image and text based challenge questions authentication in online examination. International Conference on Education Technologies and Computers (ICETC): 24\u201329, Lodz, Poland","DOI":"10.1109\/ICETC.2014.6998897"},{"issue":"1","key":"1429_CR12","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1080\/0142159X.2018.1441984","volume":"41","author":"M Zheng","year":"2019","unstructured":"Zheng M, Bender D (2019) Evaluating outcomes of computer-based classroom testing: student acceptance and impact on learning and exam performance. Med Teacher 41(1):75\u201382","journal-title":"Med Teacher"},{"key":"1429_CR13","doi-asserted-by":"publisher","first-page":"39117","DOI":"10.1109\/ACCESS.2018.2851790","volume":"6","author":"A Moubayed","year":"2018","unstructured":"Moubayed A, Injadat M, Ali BN, Hanan L, Shami A (2018) E-learning: challenges and research opportunities using machine learning & data analytics. IEEE Access 6:39117\u201339138","journal-title":"IEEE Access"},{"key":"1429_CR14","first-page":"72724","volume":"6","author":"S Kausar","year":"2018","unstructured":"Kausar S, Huahu X, Hussain I, Wenhao Z, Zahid M (2018) Integration of data mining clustering approach in the personalized E-learning system. Special Sect AI-Driven Big Data Process: Theory, Method Applic 6:72724\u201372734","journal-title":"Special Sect AI-Driven Big Data Process: Theory, Method Applic"},{"key":"1429_CR15","volume-title":"Secure e-learning and cryptography","author":"W Alhamdani","year":"2013","unstructured":"Alhamdani W (2013) Secure e-learning and cryptography. IGI Global, USA p. 369"},{"issue":"10","key":"1429_CR16","first-page":"377","volume":"14","author":"AS Ghafoor","year":"2016","unstructured":"Ghafoor AS, Rajper S (2016) E-learners\u2019 behavioral analysis using clustering technique. Int J Comput Sci Inform Sec (IJCSIS) 14(10):377\u2013381","journal-title":"Int J Comput Sci Inform Sec (IJCSIS)"},{"issue":"2","key":"1429_CR17","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1108\/AAOUJ-09-2016-0036","volume":"11","author":"Q Wu","year":"2016","unstructured":"Wu Q, Zhan C (2016) Clustering of online learning resources via minimum spanning tree. Asian Assoc Open Univ J 11(2):197\u2013215","journal-title":"Asian Assoc Open Univ J"},{"key":"1429_CR18","doi-asserted-by":"crossref","unstructured":"M. Hussain, W. Zhu, W. Zhang and R. A. S. Muhammad, \"Student Engagement Predictions in an e-Learning System and Their Impact on Student Course Assessment Scores,\" Hindawi Computational Intelligence and Neuroscience: 1\u201322, 2 Octobar 2018","DOI":"10.1155\/2018\/6347186"},{"issue":"8","key":"1429_CR19","first-page":"146","volume":"3","author":"IHM Shovon","year":"2012","unstructured":"Shovon IHM, Haque M (2012) An approach of improving Student\u2019s academic performance by using K-means clustering algorithm and decision tree. Int J Adv Comput Sci Appl 3(8):146\u2013149","journal-title":"Int J Adv Comput Sci Appl"},{"issue":"4","key":"1429_CR20","first-page":"1","volume":"10","author":"R Pecori","year":"2018","unstructured":"Pecori R (2018) Virtual learning architecture enhanced by fog computing and big data streams. Future Internet 10(4):1\u201318","journal-title":"Future Internet"},{"issue":"1","key":"1429_CR21","first-page":"41","volume":"14","author":"PK Ahmad","year":"2015","unstructured":"Ahmad PK, Tanika DS, Indrayadi Y (2015) Developing E-learning system to support teaching and learning activities using DSDM approach. performa 14(1):41\u201352","journal-title":"performa"},{"key":"1429_CR22","doi-asserted-by":"crossref","unstructured":"AjazMoharkan Z, Choudhury T, Chand GSRG (2017) Internet of Things and its applications in E-learning. 3rd IEEE International Conference on Computational Intelligence and Communication Technology: 1\u20135, Ghaziabad, India","DOI":"10.1109\/CIACT.2017.7977333"},{"key":"1429_CR23","doi-asserted-by":"crossref","unstructured":"Pinjari H, Paul A, Jeon G, Rho S (2018) Context-Driven Mobile Learning Using Fog Computing,,\" in International Conference on Platform Technology and Service (PlatCon), Jeju: 1\u20136","DOI":"10.1109\/PlatCon.2018.8472763"},{"key":"1429_CR24","doi-asserted-by":"crossref","unstructured":"Yamada M, Cuka M, Liu Y, da Matsuo TK, Barolli L (2017) Performance evaluation of an IoT-Based E-Learning Testbed Using Mean-shift Clustering Approach Considering Delta Type of Brain Waves. 31st International Conference on Advanced Information Networking and Applications Workshops: 265\u2013270, Taipei","DOI":"10.1109\/WAINA.2017.65"},{"key":"1429_CR25","doi-asserted-by":"crossref","unstructured":"Matsuo K, Yamada M, Bylykbashi K, Cuka M, Liu Y, Barolli L (2018) Implementation of an IoT-Based E-learning Testbed: Performance Evaluation Using Mean-Shift Clustering Approach Considering Four Types of Brain Waves. 32nd International Conference on Advanced Information Networking and Applications Workshops: 203\u2013209, Krakow, Poland","DOI":"10.1109\/WAINA.2018.00088"},{"key":"1429_CR26","doi-asserted-by":"crossref","unstructured":"Aissaoui K, Azizi M (2017) El-Security: E-learning Systems Security Checker Plug-in. Proceedings of the 2nd international Conference on Big Data, Cloud and Applications: 1\u20136, Tetouan, Morocco","DOI":"10.1145\/3090354.3090452"},{"key":"1429_CR27","doi-asserted-by":"publisher","first-page":"2689","DOI":"10.1016\/j.sbspro.2011.04.171","volume":"15","author":"CD Luminita","year":"2011","unstructured":"Luminita CD (2011) Information security in E-learning platforms. Procedia - Social Behav Sci 15:2689\u20132693","journal-title":"Procedia - Social Behav Sci"},{"issue":"2","key":"1429_CR28","doi-asserted-by":"publisher","first-page":"148","DOI":"10.20533\/ijds.2040.2570.2010.0019","volume":"1","author":"HAM Najwa","year":"2010","unstructured":"Najwa HAM, Fan I-S (2010) E-learning and information security management. Int J Digit Soc 1(2):148\u2013156","journal-title":"Int J Digit Soc"},{"issue":"1","key":"1429_CR29","first-page":"51","volume":"4","author":"N Barik","year":"2012","unstructured":"Barik N, Karforma S (2012) Risks and remedies in E-learning system. Int J Netw Sec Applic 4(1):51\u201359","journal-title":"Int J Netw Sec Applic"},{"key":"1429_CR30","doi-asserted-by":"crossref","unstructured":"Savulescu C, Polkowski Z, Cosmin D, Elena B (2015) Security in e-learning systems. 7th International Conference on Electronics, Computers and Artificial Intelligence (ECAI): 19\u201324, Bucharest, Romania","DOI":"10.1109\/ECAI.2015.7301225"},{"issue":"12","key":"1429_CR31","first-page":"410","volume":"3","author":"P Singh","year":"2014","unstructured":"Singh P, Shende P (2014) Symmetric key cryptography: current trends. Int J Comput Sci Mob Comput 3(12):410\u2013412","journal-title":"Int J Comput Sci Mob Comput"},{"issue":"2","key":"1429_CR32","first-page":"6","volume":"1","author":"J Thakur","year":"2011","unstructured":"Thakur J, Kumar N (2011) DES, AES and blowfish: symmetric key cryptography algorithms simulation based performance analysis. Int J Emerg Technol Adv Eng 1(2):6\u201312","journal-title":"Int J Emerg Technol Adv Eng"},{"issue":"2","key":"1429_CR33","first-page":"112","volume":"5","author":"A Dutt","year":"2015","unstructured":"Dutt A, Aghabozrgi S, Maizatul AIB, Mahroeian H (2015) Clustering algorithms applied in educational data mining. Int J Inform Electron Eng 5(2):112\u2013116","journal-title":"Int J Inform Electron Eng"},{"key":"1429_CR34","unstructured":"Raymond JH (2014) Promoting Education: A State of the Art Machine Learning Framework for Feedback and Monitoring E-Learning Impact. IEEE Global Humanitarian Technology Conference - South Asia Satellite: 251\u2013254, Trivandrum, India"},{"key":"1429_CR35","unstructured":"Moreira D-OPJ, Silva ML, Freitas VD, Mar\u00e7al VP, Gasparini I, Amaral MA (2002) AdaptWeb: an adaptive web-based courseware. Porto Alegre, Brazil"},{"issue":"4","key":"1429_CR36","doi-asserted-by":"publisher","first-page":"1744","DOI":"10.1016\/j.compedu.2008.05.008","volume":"51","author":"S Schiaffino","year":"2008","unstructured":"Schiaffino S, Garcia P, Amandi A (2008) eTeacher: providing personalized assistance to e-learning students. Comput Educ 51(4):1744\u20131754","journal-title":"Comput Educ"},{"key":"1429_CR37","doi-asserted-by":"crossref","unstructured":"Gasparini I, Pimenta M, Eyharabide V, Amandi A (2012) Improving user profiling for a richer personalization: modeling context in e-learning. Intelligent and Adaptive Learning Systems: Technology Enhanced Support for Learners and Teachers, IGI Global: 182\u2013197","DOI":"10.4018\/978-1-60960-842-2.ch012"},{"issue":"11","key":"1429_CR38","first-page":"5938","volume":"2","author":"AI Obasa","year":"2013","unstructured":"Obasa AI, Eludire AA, Ajao TA (2013) A comparative study of synchronous and asynchronous E-learning resources. Int J Innov Res Sci Eng Technol 2(11):5938\u20135946","journal-title":"Int J Innov Res Sci Eng Technol"},{"issue":"4","key":"1429_CR39","first-page":"80","volume":"10","author":"F Tabak","year":"2014","unstructured":"Tabak F, Rampal R (2014) Synchronous e-learning: reflections and design considerations. Int J Educ Dev Using Inf Commun Technol 10(4):80\u201392","journal-title":"Int J Educ Dev Using Inf Commun Technol"},{"key":"1429_CR40","doi-asserted-by":"crossref","unstructured":"Akram A, Fu C, Tang Y, Jiang Y, Lin X (2016) Exposing the hidden to the eyes: Analysis of SCHOLAT E-Learning data. IEEE 20th International Conference on Computer Supported Cooperative Work in Design: 693\u2013698, Nanchang, China","DOI":"10.1109\/CSCWD.2016.7566073"},{"key":"1429_CR41","unstructured":"Appiahene P, Serwah S, Mensah C, Bryce K-Y (2018) Application of Wireless Ad-Hoc Networks Model to provide Education to rural Communities in Ghana. International Coference on Applied Sciences and Technology, pp. 114\u2013121, Kumasi-Ghana"},{"key":"1429_CR42","doi-asserted-by":"crossref","unstructured":"Beaudin S, Levy Y, Parrish J, Danet T (2016) An empirical study of authentication methods to secure e-learning system activities against impersonation fraud. Online J Appl Knowl Manag: 42\u201361","DOI":"10.36965\/OJAKM.2016.4(1)42-61"},{"issue":"4","key":"1429_CR43","first-page":"158","volume":"9","author":"QA Alajmi","year":"2018","unstructured":"Alajmi QA, Kamaludin A, Abdullah AR, Al-Sharafi MA (2018) The effectiveness of cloud-based E-learning towards quality of academic services: an Omanis\u2019 expert view. Int J Adv Comput Sci Appl 9(4):158\u2013164","journal-title":"Int J Adv Comput Sci Appl"},{"key":"1429_CR44","doi-asserted-by":"crossref","unstructured":"Kashyap R (2019) Biometric authentication techniques and E-learning. Biometric Authentication in Online Learning Environments: 1\u201330","DOI":"10.4018\/978-1-5225-7724-9.ch010"},{"issue":"4","key":"1429_CR45","first-page":"62","volume":"12","author":"Y Khlifi","year":"2017","unstructured":"Khlifi Y, El-Sabagh H (2017) A novel authentication scheme for E-assessments based on student behavior over E-learning platform. iJET 12(4):62\u201389","journal-title":"iJET"},{"key":"1429_CR46","doi-asserted-by":"crossref","unstructured":"Fadhel N, Wills G, Argles D (2011) Transparent authentication in E-learning. International Conference on Information Society: 336\u2013342, London, UK","DOI":"10.1109\/i-Society18435.2011.5978465"},{"issue":"2","key":"1429_CR47","doi-asserted-by":"publisher","first-page":"861","DOI":"10.1111\/bjet.12608","volume":"50","author":"A Okada","year":"2019","unstructured":"Okada A, Whitelock D, Holmes W, Edwards C (2019) E-authentication for online assessment: a mixed-method study. Br J Educ Technol 50(2):861\u2013875","journal-title":"Br J Educ Technol"},{"key":"1429_CR48","unstructured":"Schneier B (1996) Applied cryptography, John Wiley & Sons"},{"key":"1429_CR49","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/978-3-319-49625-2_21","volume-title":"E-learning, E-Education, and Online Training. Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","author":"K Jayasena","year":"2017","unstructured":"Jayasena K, Song H (2017) Private cloud with E-learning for resources sharing in university environment. In: Vincenti G, Bucciero A, Helfert M, Glowatz M (eds) E-learning, E-Education, and Online Training. Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer, Cham, pp 169\u2013180"},{"key":"1429_CR50","volume-title":"The challenges of the digital transformation in education. ICL 2018. Advances in Intelligent Systems and Computing","author":"H El-Sofany","year":"2019","unstructured":"El-Sofany H, El-Seoud S, Farouk R (2019) Studying the effect of using E-learning through secure cloud computing systems. In: Auer M, Tsiatsos T (eds) The challenges of the digital transformation in education. ICL 2018. Advances in Intelligent Systems and Computing. Springer, Cham"},{"key":"1429_CR51","doi-asserted-by":"crossref","unstructured":"Schiavone E, Ceccarelli A, Bondavalli A (2016) Continuous authentication and non-repudiation for the security of critical systems. IEEE 35th Symposium on Reliable Distributed Systems, Budapest, Hungary","DOI":"10.1109\/SRDS.2016.033"},{"key":"1429_CR52","doi-asserted-by":"crossref","unstructured":"Suciu G, Anwar M, Istrate C (2019) Mobile application and Wi-Fi network security for e-learning platforms. The International Scientific Conference eLearning and Software for Education: 393\u2013399, Bucharest","DOI":"10.12753\/2066-026X-19-052"},{"key":"1429_CR53","doi-asserted-by":"crossref","unstructured":"Bhatia M, Maitra JK (2018) E-learning Platforms Security Issues and Vulnerability Analysis. 2018 International Conference on Computational and Characterization Techniques in Engineering & Sciences (CCTES): 276\u2013285, Lucknow, India","DOI":"10.1109\/CCTES.2018.8674115"},{"key":"1429_CR54","unstructured":"Sahaya SJG, Seldev CC (2018) Secure cloud data storage approach in e-learning systems. Clust Comput: 1\u20136"},{"key":"1429_CR55","first-page":"335","volume-title":"Smart Innovations in Communication and Computational ScieSciences. Advances in Intelligent Syst & Computing","author":"S Siddiqui","year":"2019","unstructured":"Siddiqui S, Alam S, Zam K, Gupta A (2019) Cloud-based E-learning: using cloud computing platform for an effective E-learning. In: Tiwari S, Trivedi M, Mishra K, Misra A, Kumar K (eds) Smart Innovations in Communication and Computational ScieSciences. Advances in Intelligent Syst & Computing. Springer, Singapore, pp 335\u2013346"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-019-01429-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11036-019-01429-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-019-01429-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,7]],"date-time":"2023-11-07T09:10:15Z","timestamp":1699348215000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11036-019-01429-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,18]]},"references-count":55,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,4]]}},"alternative-id":["1429"],"URL":"https:\/\/doi.org\/10.1007\/s11036-019-01429-x","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"type":"print","value":"1383-469X"},{"type":"electronic","value":"1572-8153"}],"subject":[],"published":{"date-parts":[[2020,1,18]]},"assertion":[{"value":"18 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}