scispace - formally typeset
Journal ArticleDOI

A college course in cryptography and computer security

Harold Joseph Highland
- 01 Apr 1982 - 
- Vol. 1, Iss: 2, pp 34-37
Reads0
Chats0
TLDR
Back in 1978, when I was chairman of the Data Processing Department at SUNY/Farmingdale, which is located in the heart of the electronics and aerospace area on Long Island, I created a course in computer security that included several aspects of cryptography.
Abstract
Back in 1978, when I was chairman of the Data Processing Department at SUNY/Farmingdale, which is located in the heart of the electronics and aerospace area on Long Island, I created a course in computer security. Since the intensive program's objective was programming efficiency [36 credits in computing and knowledge of at least two programming languages were required for a two-year degree], I decided to include several aspects of cryptography. Doing this helped to create student interest and also it provided an opportunity for mystudents to do some special programming.

read more

Citations
More filters

Different Approaches in the Teaching of Information Systems Security

William Yurcik, +1 more
TL;DR: It is concluded that more educational development work needs to done to uniformly improve information systems security education to counterbalance pressures for technical training over fundamental concepts and this paper provides a start by synthesizing the current state-of-the-art.
Journal ArticleDOI

Teaching information systems security courses: A hands-on approach

TL;DR: The approach, experiences, lessons learned, and lessons learned for teaching security courses using a hands-on approach are described for students majoring in information systems.
Proceedings Article

Teaching Computer Security

TL;DR: This paper describes three courses in computer security, and offers come comments about their appropriateness, their advantages and their disadvantages.
Journal ArticleDOI

Teaching computer security

TL;DR: This paper provides advice on how to create a first course on computer and network security in a small college setting with the main emphasis on a set of lab exercises that provide students with practical experience appropriate to the course.
References
More filters
Journal ArticleDOI

New Directions in Cryptography

TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Journal ArticleDOI

A method for obtaining digital signatures and public-key cryptosystems

TL;DR: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key.
Journal ArticleDOI

The Mathematics of Public-Key Cryptography

TL;DR: One way to prevent tam­ pering with the new electronic systems and to protect the vast quantities of pri­ vate information such as the credit card information is to encrypt the data.
Journal ArticleDOI

Data Security

TL;DR: The general nature of controls of each type are described, the kinds of problems they can and cannot solve, and their inherent limitations and weaknesses are described.
Book

Computer Security

TL;DR: The proposed data protection scheme meets the technical constraints imposed by LPNs, while preserving data confidentiality and integrity, and shows promising results with respect to power (battery) consumption.