Sciweavers

117 search results - page 11 / 24
» A Comparison of Cryptography Courses
Sort
View
ACNS
2004
Springer
104views Cryptology» more  ACNS 2004»
14 years 25 days ago
Key Agreement Using Statically Keyed Authenticators
A family of authenticators based on static shared keys is identified and proven secure. The authenticators can be used in a variety of settings, including identity-based ones. App...
Colin Boyd, Wenbo Mao, Kenneth G. Paterson
EDUTAINMENT
2009
Springer
14 years 2 months ago
Entertaining Education - Using Games-Based and Service-Oriented Learning to Improve STEM Education
This paper addresses the development of a computer game design and development curriculum at the authors’ institution. The basis for curriculum decisions, as well as comparison t...
Jon Preston, Briana Morrison
SIGCSE
2000
ACM
181views Education» more  SIGCSE 2000»
13 years 11 months ago
Evaluating individuals in team projects
In 1999, most computer science students participate in at least one group project in some class prior to graduation. However, assessing individual student contributions to a group...
Dawn Wilkins, Pamela B. Lawhead
EUROCRYPT
2003
Springer
14 years 19 days ago
Facts and Myths of Enigma: Breaking Stereotypes
In spite of a relatively large number of publications about breaking Enigma by the Allies before and during the World War II, this subject remains relatively unknown not only to th...
Kris Gaj, Arkadiusz Orlowski
SIGCSE
2002
ACM
152views Education» more  SIGCSE 2002»
13 years 7 months ago
Learning styles and performance in the introductory programming sequence
This paper reports on the implication of different preferred learning styles on students'performance in the introductory programming sequence and on work in progress on how t...
Lynda Thomas, Mark Ratcliffe, John Woodbury, Emma ...