Security Injections@Towson: Integrating Secure Coding into Introductory Computer Science Courses.
Blair TaylorSiddharth KazaPublished in: ACM Trans. Comput. Educ. (2016)
Keyphrases
- introductory computer science
- security requirements
- security issues
- security level
- security measures
- security mechanisms
- key management
- security protocols
- security management
- information security
- computer science
- security analysis
- key agreement protocol
- stream cipher
- security services
- sensitive data
- high security
- cryptographic protocols
- security patterns
- data security
- key exchange protocol
- security properties
- authentication mechanism
- electronic voting
- authentication protocol
- user authentication
- identity management
- data encryption
- key agreement
- integrity verification
- encryption scheme
- security model
- key exchange
- coding scheme
- diffie hellman
- public key encryption
- authentication scheme
- secure communication
- security architecture
- key distribution
- secure routing
- smart card
- intrusion detection
- access control
- digital rights management
- private key
- trusted computing
- digital signature scheme
- mobile agent system
- previously mentioned
- key establishment
- information leakage
- security policies
- ad hoc networks
- public key
- public key cryptosystem
- key management scheme
- unauthorized access
- secret key
- resource constrained
- standard model
- user privacy
- network security
- rfid systems
- provably secure
- machine learning
- secure multiparty computation
- factor authentication
- elliptic curve
- data mining