{"id":"https://openalex.org/W2293916165","doi":"https://doi.org/10.1145/2670739.2670755","title":"A comparison of different methods of instruction in cryptography","display_name":"A comparison of different methods of instruction in cryptography","publication_year":2014,"publication_date":"2014-10-11","ids":{"openalex":"https://openalex.org/W2293916165","doi":"https://doi.org/10.1145/2670739.2670755","mag":"2293916165"},"language":"en","primary_location":{"id":"doi:10.1145/2670739.2670755","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2670739.2670755","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2014 Information Security Curriculum Development Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5017033294","display_name":"Frank H. Katz","orcid":null},"institutions":[{"id":"https://openalex.org/I226413961","display_name":"Armstrong Atlantic State University","ror":"https://ror.org/03rr7q548","country_code":"US","type":"education","lineage":["https://openalex.org/I226413961"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Frank H. Katz","raw_affiliation_strings":["Armstrong State University, Savannah, GA"],"affiliations":[{"raw_affiliation_string":"Armstrong State University, Savannah, GA","institution_ids":["https://openalex.org/I226413961"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5017033294"],"corresponding_institution_ids":["https://openalex.org/I226413961"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.2086987,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"1"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9351000189781189,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9351000189781189,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.8132901191711426},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7602885961532593},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6312804818153381},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6251569986343384},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.5236420631408691},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.4953516721725464},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4326717257499695},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.12764856219291687}],"concepts":[{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.8132901191711426},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7602885961532593},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6312804818153381},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6251569986343384},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.5236420631408691},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.4953516721725464},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4326717257499695},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.12764856219291687}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2670739.2670755","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2670739.2670755","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2014 Information Security Curriculum Development Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/4","score":0.8199999928474426,"display_name":"Quality Education"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W1592063330","https://openalex.org/W1742813727","https://openalex.org/W1976874772","https://openalex.org/W2085412696","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W4387497383","https://openalex.org/W3183948672","https://openalex.org/W3173606202","https://openalex.org/W3110381201","https://openalex.org/W2948807893","https://openalex.org/W2935909890","https://openalex.org/W2778153218","https://openalex.org/W2758277628","https://openalex.org/W1531601525","https://openalex.org/W2091483479"],"abstract_inverted_index":{"Cryptography":[0],"is":[1,10,44,53,135],"the":[2,29,38,45,58,65,72,114,126,140],"foundation":[3],"on":[4],"which":[5,43],"information":[6,24,85],"and":[7,33,86,130],"cyber":[8,87],"security":[9,25],"built.":[11],"As":[12],"Mark":[13],"Stamp":[14],"has":[15],"written,":[16],"\"cryptography":[17],"or":[18,36,104],"'secret":[19],"codes'":[20],"are":[21],"a":[22,109,152],"fundamental":[23,39],"tool.\"":[26],"[6]":[27,52],"Without":[28],"ability":[30],"to":[31,95,112,138],"encrypt":[32],"decrypt":[34],"messages":[35],"data,":[37],"characteristic":[40],"of":[41,47,50,61,67,74,81,128,136,142],"confidentiality,":[42],"prevention":[46],"\"unauthorized":[48],"reading":[49],"information,\"":[51],"lost.":[54],"This":[55],"could":[56],"cause":[57],"potential":[59],"exposure":[60],"trusted":[62],"information.":[63],"Given":[64],"importance":[66],"this":[68],"discipline,":[69],"teaching":[70,143],"students":[71,91,125],"basics":[73],"cryptography":[75,144],"should":[76],"be":[77],"an":[78],"integral":[79],"part":[80],"any":[82],"curriculum":[83],"in":[84,108],"security.":[88],"For":[89],"years":[90],"have":[92],"been":[93],"taught":[94],"perform":[96,113],"cryptographic":[97,115],"exercises":[98,147],"by":[99,105],"hand":[100],"performing":[101],"paper-and-pencil":[102,146],"exercises,":[103],"writing":[106],"programs":[107],"computer":[110],"language":[111],"methods.":[116],"Today,":[117],"open-source":[118],"GUI":[119,153],"software":[120,150],"exists":[121],"that":[122],"can":[123],"teach":[124],"methods":[127],"encrypting":[129],"decrypting":[131],"messages.":[132],"Consequently,":[133],"it":[134],"value":[137],"measure":[139],"effectiveness":[141],"using":[145,149],"versus":[148],"with":[151],"interface.":[154]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
