Security injections: modules to help students remember, understand, and apply secure coding techniques.
Blair TaylorSiddharth KazaPublished in: ITiCSE (2011)
Keyphrases
- security requirements
- security patterns
- security issues
- security measures
- security level
- security properties
- security mechanisms
- security protocols
- deeper understanding
- security management
- security analysis
- key management
- learning environment
- access control
- learning activities
- information security
- learning experience
- stream cipher
- key exchange
- security architecture
- public key encryption
- security model
- sensitive data
- learning process
- student learning
- coding scheme
- security policies
- data encryption
- key distribution
- diffie hellman
- key agreement protocol
- learning outcomes
- private key
- user authentication
- authentication protocol
- key exchange protocol
- authentication mechanism
- integrity verification
- e learning
- data security
- high school
- cryptographic protocols
- encryption scheme
- public key cryptosystem
- learning styles
- higher education
- key agreement
- collaborative learning
- security services
- trusted computing
- network security
- high school students
- secret key
- intrusion detection
- mobile agent system
- identity management
- distance learning
- intelligent tutoring systems
- secure routing
- resource constrained
- secure multiparty computation
- elliptic curve
- previously mentioned
- smart card
- provably secure
- secure communication