NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 7 results Save | Export
Liu, Anyi – ProQuest LLC, 2012
With increasing demand of mobile devices and cloud computing, it becomes increasingly important to develop efficient mobile application and its secured backend, such as web applications and virtualization environment. This dissertation reports a systematic study of mobile application development and the security issues of its related backend. …
Descriptors: Management Systems, Telecommunications, Internet, Databases
Nitinawarat, Sirin – ProQuest LLC, 2010
This dissertation deals with a multiterminal source model for secret key generation by multiple network terminals with prior and privileged access to a set of correlated signals complemented by public discussion among themselves. Emphasis is placed on a characterization of secret key capacity, i.e., the largest rate of an achievable secret key,…
Descriptors: Information Theory, Telecommunications, Mathematics, Computer Networks
Chow, Chi Yin – ProQuest LLC, 2010
Location-based services (LBS for short) providers require users' current locations to answer their location-based queries, e.g., range and nearest-neighbor queries. Revealing personal location information to potentially untrusted service providers could create privacy risks for users. To this end, our objective is to design a privacy-preserving…
Descriptors: Reaction Time, Privacy, Geographic Information Systems, Geographic Location
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Nunes, Miguel Baptista, Ed.; Isaias, Pedro, Ed. – International Association for Development of the Information Society, 2019
These proceedings contain the papers and posters of the International Conference on e-Learning (EL) 2019, which was organised by the International Association for Development of the Information Society and co-organised by the Instituto Superior de Engenharia do Porto, in Porto, Portugal, July 17-19, 2019. The EL 2019 conference aims to address the…
Descriptors: Educational Technology, Technology Uses in Education, Mathematics Instruction, Cooperation
Peer reviewed Peer reviewed
Direct linkDirect link
Yuan, Xiaohong; Vega, Percy; Qadah, Yaseen; Archer, Ricky; Yu, Huiming; Xu, Jinsheng – ACM Transactions on Computing Education, 2010
Using animated visualization tools has been an important teaching approach in computer science education. We have developed three visualization and animation tools that demonstrate various information security concepts and actively engage learners. The information security concepts illustrated include: packet sniffer and related computer network…
Descriptors: Computer Science Education, Visualization, Teaching Methods, Undergraduate Study
Sánchez, Inmaculada Arnedillo, Ed.; Isaías, Pedro, Ed. – International Association for Development of the Information Society, 2014
These proceedings contain the papers of the 10th International Conference on Mobile Learning 2014, which was organised by the International Association for Development of the Information Society, in Madrid, Spain, February 28-March 2, 2014. The Mobile Learning 2014 International Conference seeks to provide a forum for the presentation and…
Descriptors: Conference Papers, Telecommunications, Handheld Devices, Technology Uses in Education
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers