| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910457435203321 |
|
|
Autore |
Barnett Ronald |
|
|
Titolo |
Engaging the curriculum in higher education [[electronic resource] /] / Ronald Barnett and Kelly Coate |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Maidenhead, England ; ; New York, : Society for Research into Higher Education, : Open University Press, c2005 |
|
|
|
|
|
|
|
|
|
ISBN |
|
9786610950683 |
1-280-95068-4 |
0-335-22414-8 |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (201 p.) |
|
|
|
|
|
|
Altri autori (Persone) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Education, Higher - Curricula |
Curriculum planning |
Electronic books. |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
pt. 1. The possibility of curriculum -- pt. 2. Signs of curriculum life -- pt. 3. Prospects for engagement. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
There is greater interest than ever before in higher education: more money is being spent on it, more students are registered and more courses are being taught. And yet the matter that is arguably at the heart of higher education, the curriculum, is noticeable for its absence in public debate and in the literature on higher education. This book begins to redress the balance. Even though the term `curriculum¿ may be missing from debates on higher education, curricula are changing rapidly and in s |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNISA996418296503316 |
|
|
Titolo |
Security, privacy, and applied cryptography engineering : 10th international conference, SPACE 2020, Kolkata, India, December 17-21, 2020 : proceedings / / Lejla Batina, Stjepan Picek, Mainack Mondal (editors) |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham, Switzerland : , : Springer, , [2020] |
|
©2020 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2020.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (X, 259 p. 87 illus., 37 illus. in color.) |
|
|
|
|
|
|
Collana |
|
Lecture notes in computer science ; ; 12586 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Data encryption (Computer science) |
Computer security |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
tPAKE: Typo-Tolerant Password-Authenticated Key Exchange -- PAS-TA-U: PASsword-based Threshold Authentication with Password Update -- Re-Markable: Stealing Watermarked Neural Networks through Synthesis -- Robust Adaptive Cloud Intrusion Detection System using Advanced Deep Reinforcement Learning -- A Forensic Technique to Detect Copy-Move Forgery based on Image Statistics -- ExtPFA: Extended Persistent Fault Analysis for Deeper Rounds of Bit Permutation based ciphers with a case study on GIFT -- On Configurable SCA Countermeasures Against Single Trace Attacks for the NTT -- HEDrone: Privacy-Preserving Proof-of-Alibi for Drone Compliance Based on Homomorphic Encryption -- Fiat-Shamir with Aborts: From Identification Schemes to Linkable Ring Signatures -- An Insecurity Study of Ethereum Smart Contracts -- Cryptographically Secure Multi-Tenant Provisioning of FPGAs -- Experimental results on higher-order differential spectra of 6 and 8-bit invertible S-boxes -- Quantum Resource Estimates of Grover’s Key Search on ARIA. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This book constitutes the refereed proceedings of the 10th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2020, held in Kolkata, India, in |
|
|
|
|
|
|
|
|
|
|
December 2020. Due to COVID-19 pandemic, the conference was held virtual. The 13 full papers presented were carefully reviewed and selected from 48submissions. This annual event is devoted to various aspects of security, privacy, applied cryptography, and cryptographic engineering. This is a very challenging field, requiring the expertise from diverse domains, ranging from mathematics to solid-state circuit design. |
|
|
|
|
|
| |