Author:
Sánchez G. Rodríguez,Encinas A. Hernández,Encinas L. Hernández,del Rey A. Martín,Dios A. Queiruga
Reference11 articles.
1. Al-Hamdani, W.A., and Griskell, I. J. (2005). A proposed curriculum of cryptography courses. Proceedings of the 2nd annual conference on Information security curriculum development. ACM.
2. Bringslid, O., Hernández-Encinas, A., Martín del Rey, A., Martín-Vaquero, J., Queiruga-Dios, A. (2011). Case Study: Coding Theory Subject Design for Engineering Students at the University of Salamanca. Transactions on Advanced Research, 7(2).
3. Duffy, P. and Bruns, A. (2006). The use of blogs, wikis and RSS in education: A conversation of possibilities. Proceedings of the Online Learning and Teaching Conference 2006.
4. ElGamal, T. (1985). A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. IEEE Transactions on Information Theory, 31(4), 469-472.
5. García, A., García, F., Del Rey, . M., Rodríguez, G., and De La Villa, A. (2014). Changing assessment methods: New rules, new roles. Journal of Symbolic Computation, 61, 70-84.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Secret Code: A STEAM Project to Teach Mathematics in Higher Education;2024 5th International Conference in Electronic Engineering, Information Technology & Education (EEITE);2024-05-29