메뉴 건너뛰기




Volumn 2, Issue 2, 2013, Pages 79-87

Task based interdisciplinary E-commerce course with UML sequence diagrams, algorithm transformations and spatial circuits to boost learning information security concepts

Author keywords

Cryptographic algorithms; E commerce; E wallet; PayPal; Spatial circuits; Symbolic representations; Task based learning; UML sequence diagrams

Indexed keywords


EID: 84883044296     PISSN: None     EISSN: 2210142X     Source Type: Journal    
DOI: 10.12785/IJCDS/020204     Document Type: Article
Times cited : (3)

References (19)
  • 1
    • 85104918341 scopus 로고    scopus 로고
    • ES Announcement, last accessed April 6, 2013
    • http://csrc.nist.gov/publications/fips/fips197/fips -197.pdf ES Announcement, last accessed April 6, 2013
  • 2
    • 0017930809 scopus 로고
    • A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
    • R.L.Rivest, A. Shamir; L. Adleman "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems". Communications of the ACM 21 1978.
    • (1978) Communications of the ACM , vol.21
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 3
    • 85104928621 scopus 로고    scopus 로고
    • last accessed April, 6, 2013
    • http://csrc.nist.gov/groups/ST/hash/sha-3/winner_sha3.html last accessed April, 6, 2013
  • 4
    • 0001604533 scopus 로고    scopus 로고
    • Blind signature for untraceable payments
    • Springer Verlag, p
    • D. Chaum., “Blind signature for untraceable payments”, Advances in Cryptology – Crypto - 82, Springer Verlag, p.p. 199-203
    • Advances in Cryptology – Crypto - 82 , pp. 199-203
    • Chaum, D.1
  • 8
    • 79960033523 scopus 로고    scopus 로고
    • Learning Digital Cashless Applications with Consolidation of Authenticity, Confidentiality and Integrity using SequenceDiagrams
    • Dubai May
    • A. Herath,., S Herath. et al, “Learning Digital Cashless Applications with Consolidation of Authenticity, Confidentiality and Integrity using SequenceDiagrams”, Conference on Computer Science, Engineering and Applications, Dubai May 2011
    • (2011) Conference on Computer Science, Engineering and Applications
    • Herath, A.1    Herath, S2
  • 9
    • 85058048686 scopus 로고    scopus 로고
    • Secure Digital Cashless Transactions with Sequence Diagrams and Spatial Circuits to Enhance theInformation Assurance and Security Education
    • Y. Albastaki, A. Herath, “Secure Digital Cashless Transactions with Sequence Diagrams and Spatial Circuits to Enhance theInformation Assurance and Security Education”, International Journal of Advanced Computer Science and Applications,Vol. 3, No.4, 2012.
    • (2012) International Journal of Advanced Computer Science and Applications , vol.3 , Issue.4
    • Albastaki, Y.1    Herath, A.2
  • 10
    • 0023247970 scopus 로고
    • Efficient and timely mutual authentication
    • D.Otway, O.Rees,"Efficient and timely mutual authentication". Operating Systems Review, 1987, 21 8 - 10.
    • (1987) Operating Systems Review , vol.21 , pp. 8-10
    • Otway, D.1    Rees, O.2
  • 11
    • 0028514601 scopus 로고
    • Kerberos: An Authentication Service for Computer Networks
    • September
    • Neuman B. C.; T'so T. Y., “Kerberos: An Authentication Service for Computer Networks”, IEEE Communications Magazine, September, 1994.
    • (1994) IEEE Communications Magazine
    • Neuman, B. C.1    T'so, T. Y.2
  • 14
    • 85104913479 scopus 로고    scopus 로고
    • NIST's SHA-3 Contest: last accessed April, 6, 2013
    • http://csrc.nist.gov/groups/ST/hash/sha-3/index.html NIST's SHA-3 Contest: last accessed April, 6, 2013
  • 19
    • 85104913893 scopus 로고    scopus 로고
    • last accessed April, 6, 2013
    • https://www.schneier.com/paper-blowfish-fse.html last accessed April, 6, 2013


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.