{"id":"https://openalex.org/W4214813262","doi":"https://doi.org/10.1109/icaiic54071.2022.9722680","title":"Edge-Computing based Secure E-learning Platforms","display_name":"Edge-Computing based Secure E-learning Platforms","publication_year":2022,"publication_date":"2022-02-21","ids":{"openalex":"https://openalex.org/W4214813262","doi":"https://doi.org/10.1109/icaiic54071.2022.9722680"},"language":"en","primary_location":{"id":"doi:10.1109/icaiic54071.2022.9722680","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icaiic54071.2022.9722680","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5054376156","display_name":"Sameer Ahmad Bhat","orcid":"https://orcid.org/0000-0001-9396-7760"},"institutions":[{"id":"https://openalex.org/I179311214","display_name":"Gulf University for Science & Technology","ror":"https://ror.org/04d9rzd67","country_code":"KW","type":"education","lineage":["https://openalex.org/I179311214"]},{"id":"https://openalex.org/I169333911","display_name":"Gda\u0144sk University of Technology","ror":"https://ror.org/006x4sc24","country_code":"PL","type":"education","lineage":["https://openalex.org/I169333911"]}],"countries":["KW","PL"],"is_corresponding":true,"raw_author_name":"Sameer Ahmad Bhat","raw_affiliation_strings":["Gulf University for Science and Technology (GUST),Graduate Studies and Research,Kuwait","Graduate Studies and Research, Gulf University for Science and Technology (GUST), Kuwait","Dept. of Multimedia Systems, Gdansk University of Technology, Pomerania Gdansk, Republic of Poland"],"affiliations":[{"raw_affiliation_string":"Gulf University for Science and Technology (GUST),Graduate Studies and Research,Kuwait","institution_ids":["https://openalex.org/I179311214"]},{"raw_affiliation_string":"Graduate Studies and Research, Gulf University for Science and Technology (GUST), Kuwait","institution_ids":["https://openalex.org/I179311214"]},{"raw_affiliation_string":"Dept. of Multimedia Systems, Gdansk University of Technology, Pomerania Gdansk, Republic of Poland","institution_ids":["https://openalex.org/I169333911"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053554185","display_name":"Dalia Alyahya","orcid":null},"institutions":[{"id":"https://openalex.org/I28022161","display_name":"King Saud University","ror":"https://ror.org/02f81g417","country_code":"SA","type":"education","lineage":["https://openalex.org/I28022161"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Dalia Alyahya","raw_affiliation_strings":["King Saud University (KSU),Dept. of Instructional Technology,Riyadh,Saudi Arabia","Dept. of Instructional Technology, King Saud University (KSU), Riyadh, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"King Saud University (KSU),Dept. of Instructional Technology,Riyadh,Saudi Arabia","institution_ids":["https://openalex.org/I28022161"]},{"raw_affiliation_string":"Dept. of Instructional Technology, King Saud University (KSU), Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I28022161"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5107875432","display_name":"Muneer Ahmad Dar","orcid":null},"institutions":[{"id":"https://openalex.org/I8778637","display_name":"National Institute of Technology Srinagar","ror":"https://ror.org/03sfwvw54","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210152752","https://openalex.org/I8778637"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Muneer Ahmad Dar","raw_affiliation_strings":["National Institute of Electronics and Information Technology (NIELIT),Jammu & Kashmir,India","National Institute of Electronics and Information Technology (NIELIT), Jammu & Kashmir, India"],"affiliations":[{"raw_affiliation_string":"National Institute of Electronics and Information Technology (NIELIT),Jammu & Kashmir,India","institution_ids":["https://openalex.org/I8778637"]},{"raw_affiliation_string":"National Institute of Electronics and Information Technology (NIELIT), Jammu & Kashmir, India","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5078235893","display_name":"Saadiya Shah","orcid":null},"institutions":[{"id":"https://openalex.org/I8778637","display_name":"National Institute of Technology Srinagar","ror":"https://ror.org/03sfwvw54","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210152752","https://openalex.org/I8778637"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Saadiya Shah","raw_affiliation_strings":["National Institute of Electronics and Information Technology (NIELIT),Jammu & Kashmir,India","National Institute of Electronics and Information Technology (NIELIT), Jammu & Kashmir, India"],"affiliations":[{"raw_affiliation_string":"National Institute of Electronics and Information Technology (NIELIT),Jammu & Kashmir,India","institution_ids":["https://openalex.org/I8778637"]},{"raw_affiliation_string":"National Institute of Electronics and Information Technology (NIELIT), Jammu & Kashmir, India","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5054376156"],"corresponding_institution_ids":["https://openalex.org/I169333911","https://openalex.org/I179311214"],"apc_list":null,"apc_paid":null,"fwci":0.6063,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.70346913,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"17","issue":null,"first_page":"324","last_page":"328"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9912999868392944,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.781588077545166},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7060368061065674},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6394975185394287},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.5850902795791626},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5161257982254028},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4990706443786621},{"id":"https://openalex.org/keywords/learning-management","display_name":"Learning Management","score":0.4676147699356079},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4170774221420288},{"id":"https://openalex.org/keywords/multimedia","display_name":"Multimedia","score":0.3882899880409241},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3770526647567749},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.32699447870254517}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.781588077545166},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7060368061065674},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6394975185394287},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.5850902795791626},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5161257982254028},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4990706443786621},{"id":"https://openalex.org/C2779114481","wikidata":"https://www.wikidata.org/wiki/Q6510117","display_name":"Learning Management","level":2,"score":0.4676147699356079},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4170774221420288},{"id":"https://openalex.org/C49774154","wikidata":"https://www.wikidata.org/wiki/Q131765","display_name":"Multimedia","level":1,"score":0.3882899880409241},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3770526647567749},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.32699447870254517},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icaiic54071.2022.9722680","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icaiic54071.2022.9722680","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W208288874","https://openalex.org/W1894613511","https://openalex.org/W2105284042","https://openalex.org/W2125468779","https://openalex.org/W2529547014","https://openalex.org/W2547318772","https://openalex.org/W2741846028","https://openalex.org/W2785819992","https://openalex.org/W2887546921","https://openalex.org/W2889180114","https://openalex.org/W2898117089","https://openalex.org/W2936152230","https://openalex.org/W2984055793","https://openalex.org/W3000503443","https://openalex.org/W3012289806","https://openalex.org/W3015074897","https://openalex.org/W3021951958","https://openalex.org/W3111594677","https://openalex.org/W3113300078","https://openalex.org/W3118186245","https://openalex.org/W3135217284","https://openalex.org/W3173820161","https://openalex.org/W3195981905","https://openalex.org/W3202887189","https://openalex.org/W3209660496","https://openalex.org/W4200473914","https://openalex.org/W6753845331","https://openalex.org/W6754166434","https://openalex.org/W6775875241","https://openalex.org/W6803044172"],"related_works":["https://openalex.org/W4244478748","https://openalex.org/W3150465815","https://openalex.org/W4223488648","https://openalex.org/W2134969820","https://openalex.org/W2251605416","https://openalex.org/W1997222214","https://openalex.org/W2560439919","https://openalex.org/W4389340727","https://openalex.org/W2802581102","https://openalex.org/W4205786897"],"abstract_inverted_index":{"Implementation":[0],"of":[1,45,65,83],"Information":[2],"and":[3,24,37,56,63,88,98,139],"Communication":[4],"Technologies":[5],"(ICT)":[6],"in":[7,15,104],"E-Learning":[8],"environments":[9],"have":[10],"brought":[11],"up":[12],"dramatic":[13],"changes":[14],"the":[16,59,94,105],"current":[17,106],"educational":[18,32],"sector.":[19],"Distance":[20],"learning,":[21,23],"online":[22,49],"networked":[25],"learning":[26,38,47],"are":[27,52],"few":[28],"examples":[29],"that":[30,102],"promote":[31],"interaction":[33],"between":[34],"students,":[35],"lecturers":[36],"communities.":[39],"Although":[40],"being":[41],"an":[42],"efficient":[43],"form":[44],"real":[46],"resource,":[48],"electronic":[50],"resources":[51],"subject":[53],"to":[54,93,126],"threats":[55],"vulnerabilities":[57],"on":[58],"internet.":[60],"Authentication,":[61],"access":[62,100,138],"storage":[64],"data":[66,99,114],"is":[67],"a":[68,80],"major":[69],"concern":[70],"among":[71],"many":[72],"organizations":[73],"implementing":[74],"E-learning":[75,107,124],"platforms.":[76],"This":[77],"study":[78,117],"provides":[79],"literature":[81],"review":[82],"past":[84],"five-year":[85],"research":[86],"studies,":[87],"proposes":[89],"Edge-computing":[90,122],"based":[91,123],"solution":[92],"currently":[95],"existing":[96],"authentication":[97],"problems":[101],"prevail":[103],"management":[108],"systems":[109],"using":[110],"cloud":[111],"services":[112],"for":[113,136],"storage.":[115],"The":[116],"guides":[118],"researchers":[119],"towards":[120],"enabling":[121],"platforms":[125],"support":[127],"low":[128],"power":[129],"computing":[130],"devices":[131],"running":[132],"Elliptic":[133],"Curve":[134],"Cryptography":[135],"secure":[137],"authentication.":[140]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
