Search

Published After
Published Before

Search Results

  • Online self-learning
    542-553
    Views:
    182

    In this paper four short sessions are reviewed in the theme of introductory programming. The sessions were performed in four different student groups from the age twelve to seventeen in two different schools. The paper summarizes important input and output properties of the groups, like the preliminary studies of Informatics and the grades in both Informatics and Mathematics – if available – also the results of the learning process during the sessions. The focus is on the skills of programming and self-learning, and the differences of it in respect to the age, the gender and the preliminary studies.

  • Gamification in Programming - a Short Introductory Session in Programming with Online Games
    16-22
    Views:
    216

    Nowadays computer science is a diversified discipline with a wide range of interdisciplinary applications. Because of that, teachers at primary or high schools unavoidably face the following problem: What are the most useful fields, topics and applications of computer science and programming, and how can we teach them to be motivating enough for a student from the Z generation. In this paper we give a possible answer for the question above by presenting a short introductory session in programming for students in primary and high school. Our primary aim with the above session is to motivate students to continue their studies in engineering higher education. We also present our experiences about two experimental classes here.

  • Security Analysis of a „Location-stamping” Protocol for GPS Coordinates
    1-12
    Views:
    158

    Due to the rapid growth of GNSS based techniques in everyday life a service which can provide certified location information given by GPS coordinates became a worth considering idea. We designed two protocols that can  achieve this goal, these can provide authenticate location and time information for any device which has a GPS receiver. In this article, I would like to prove -with the help of ProVerif software tool-, the latter statement. I investigated the authenticity and data integrity properties of the protocol.

  • Security Evaluation of MODBUS RTU Protocol, Testing New Cryptographic Methods
    35-42
    Views:
    165

    In the late decade, the number of attacks against SCADA, CIS, or ICS systems had grown considerably. The purpose of this paper is to summarize the results of the implementation of a new cryptographic method on th e MODBUS RTU line.

Database Logos