Keresés

Publikált ez után
Publikált ez előtt

Keresési eredmények

  • A MODBUS RTU protokoll biztonságtechnikai vizsgálata, új kriptográfiai megoldások tesztelése
    35-42
    Megtekintések száma:
    142

    Az elmúlt évtized alatt a SCADA, CIS, ICS és hasonló rendszerek elleni támadások száma nagyban megnövekedett, ezek a rendszerek egyre védtelenebbek. A dolgozat célja, hogy a MODBUS RTU protokoll biztonsági hiányosságaira megoldást jelentő új kriptográfiai megoldás implementációja során gyűjtött tapasztalatokat összegezze.

  • Online self-learning
    542-553
    Megtekintések száma:
    173

    In this paper four short sessions are reviewed in the theme of introductory programming. The sessions were performed in four different student groups from the age twelve to seventeen in two different schools. The paper summarizes important input and output properties of the groups, like the preliminary studies of Informatics and the grades in both Informatics and Mathematics – if available – also the results of the learning process during the sessions. The focus is on the skills of programming and self-learning, and the differences of it in respect to the age, the gender and the preliminary studies.

  • Gamification in Programming - a Short Introductory Session in Programming with Online Games
    16-22
    Megtekintések száma:
    204

    Nowadays computer science is a diversified discipline with a wide range of interdisciplinary applications. Because of that, teachers at primary or high schools unavoidably face the following problem: What are the most useful fields, topics and applications of computer science and programming, and how can we teach them to be motivating enough for a student from the Z generation. In this paper we give a possible answer for the question above by presenting a short introductory session in programming for students in primary and high school. Our primary aim with the above session is to motivate students to continue their studies in engineering higher education. We also present our experiences about two experimental classes here.

  • Security Analysis of a „Location-stamping” Protocol for GPS Coordinates
    1-12
    Megtekintések száma:
    149

    Due to the rapid growth of GNSS based techniques in everyday life a service which can provide certified location information given by GPS coordinates became a worth considering idea. We designed two protocols that can  achieve this goal, these can provide authenticate location and time information for any device which has a GPS receiver. In this article, I would like to prove -with the help of ProVerif software tool-, the latter statement. I investigated the authenticity and data integrity properties of the protocol.

Adatbázis logók