A family of authenticators based on static shared keys is identified and proven secure. The authenticators can be used in a variety of settings, including identity-based ones. App...
This paper addresses the development of a computer game design and development curriculum at the authors’ institution. The basis for curriculum decisions, as well as comparison t...
In 1999, most computer science students participate in at least one group project in some class prior to graduation. However, assessing individual student contributions to a group...
In spite of a relatively large number of publications about breaking Enigma by the Allies before and during the World War II, this subject remains relatively unknown not only to th...
This paper reports on the implication of different preferred learning styles on students'performance in the introductory programming sequence and on work in progress on how t...
Lynda Thomas, Mark Ratcliffe, John Woodbury, Emma ...