{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T19:03:21Z","timestamp":1730228601648,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,2,21]],"date-time":"2022-02-21T00:00:00Z","timestamp":1645401600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,2,21]],"date-time":"2022-02-21T00:00:00Z","timestamp":1645401600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,2,21]]},"DOI":"10.1109\/icaiic54071.2022.9722680","type":"proceedings-article","created":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T20:41:38Z","timestamp":1646167298000},"page":"324-328","source":"Crossref","is-referenced-by-count":2,"title":["Edge-Computing based Secure E-learning Platforms"],"prefix":"10.1109","author":[{"given":"Sameer Ahmad","family":"Bhat","sequence":"first","affiliation":[{"name":"Gulf University for Science and Technology (GUST),Graduate Studies and Research,Kuwait"}]},{"given":"Dalia","family":"Alyahya","sequence":"additional","affiliation":[{"name":"King Saud University (KSU),Dept. of Instructional Technology,Riyadh,Saudi Arabia"}]},{"given":"Muneer Ahmad","family":"Dar","sequence":"additional","affiliation":[{"name":"National Institute of Electronics and Information Technology (NIELIT),Jammu & Kashmir,India"}]},{"given":"Saadiya","family":"Shah","sequence":"additional","affiliation":[{"name":"National Institute of Electronics and Information Technology (NIELIT),Jammu & Kashmir,India"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1111\/bjet.12795"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-019-01429-x"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-81-322-2268-2_12"},{"key":"ref13","first-page":"691","article-title":"Secure e-Learning Framework (SeLF) BT - Information Systems Design and Intelligent Applications","author":"barik","year":"2015"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TSSA.2017.8272903"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3090354.3090452"},{"key":"ref16","first-page":"1","article-title":"Secure Online Examination System for e-learning","author":"l","year":"2019","journal-title":"2019 IEEE Canadian Conference of Electrical and Computer Engineering (CCECE)"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.4841"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICECA49313.2020.9297463"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2991734"},{"year":"2021","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1046\/j.1360-3736.2003.00184.x"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/FIE44824.2020.9274066"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1080\/08923647.2020.1696140"},{"article-title":"E-learning in the 21st century: A community of inquiry framework for research and practice","year":"2016","author":"garrison","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1002\/pfi.4140410512"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SmartIoT.2019.00040"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CCICT53244.2021.00046"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.14742\/ajet.791"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MI-STA52233.2021.9464370"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3402\/gha.v9.33429"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.3991\/ijim.v15i23.26337"},{"key":"ref22","first-page":"76","article-title":"Mobile Electronic Performance Support System as a Learning and Performance Solution: A Qualitative Study Examining Usage, Performance, and Attitudes","volume":"17","author":"askar","year":"2018","journal-title":"Turkish Online Journal of Educational Technology"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2016.7732255"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-819664-9.00006-5"},{"key":"ref23","article-title":"RNS-Flexible hardware accelerators for high-security asymmetric cryptography","author":"djath","year":"2021","journal-title":"Doctoral dissertation"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3471140"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2021.0120293"}],"event":{"name":"2022 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","start":{"date-parts":[[2022,2,21]]},"location":"Jeju Island, Korea, Republic of","end":{"date-parts":[[2022,2,24]]}},"container-title":["2022 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9722611\/9722613\/09722680.pdf?arnumber=9722680","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,20]],"date-time":"2022-06-20T21:21:16Z","timestamp":1655760076000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9722680\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,21]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/icaiic54071.2022.9722680","relation":{},"subject":[],"published":{"date-parts":[[2022,2,21]]}}}