The students' self perception on learning C++ programming via the cryptography project: a case study
C++ programming course is among the most common programming subjects offered in tertiary education. Students’ programming skills and other soft skills can be enhanced by adopting a project-based learning approach to the topic of Cryptography. Furthermore, students should be exposed to cryptography s...
| Main Authors: | Kamarudin, Shafinah, Punzalan, Christopher, Derahman, Mohd Noor, Mohd, Siti Munirah, Mohd Jan, Nurhidaya, Abdul Wahab, Amelia Natasya |
|---|---|
| Format: | Article |
| Published: |
Human Resource Management Academic Research Society
2022
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/103747/ |
Similar Items
Practical cryptography: algorithms and implementations using C++
Published: (2014)
Published: (2014)
Scalar multiplication via elliptic nets with application to cryptography
by: Muslim, Norliana, et al.
Published: (2018)
by: Muslim, Norliana, et al.
Published: (2018)
Chaos Based Cryptography An Alternative to Algebraic Cryptography
by: Kamel Ariffin, Muhammad Rezal
Published: (2008)
by: Kamel Ariffin, Muhammad Rezal
Published: (2008)
Communications cryptography
by: Khalifa, Othman Omran, et al.
Published: (2004)
by: Khalifa, Othman Omran, et al.
Published: (2004)
Quantum cryptography
by: Messikh, Azeddin
Published: (2011)
by: Messikh, Azeddin
Published: (2011)
Implementation of hashed cryptography algorithm based on cryptography message syntax
by: Ali, Mohammed Ahnaf
Published: (2019)
by: Ali, Mohammed Ahnaf
Published: (2019)
A case study: the secondary students overall satisfaction on online learning
by: Mohd, Siti Munirah, et al.
Published: (2024)
by: Mohd, Siti Munirah, et al.
Published: (2024)
Number theoretical foundations in cryptography
by: Mohd Atan, Kamel Ariffin
Published: (2016)
by: Mohd Atan, Kamel Ariffin
Published: (2016)
Cryptography as a Service (CaaS): Quantum cryptography for secure cloud computing
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017)
Basics of security and cryptography
by: Pathan, Al-Sakib Khan
Published: (2014)
by: Pathan, Al-Sakib Khan
Published: (2014)
Theory of quantum cryptography
by: Ali, Sellami, et al.
Published: (2011)
by: Ali, Sellami, et al.
Published: (2011)
Machine based cryptography
by: Makarin, Rusydi Hasan, et al.
Published: (2011)
by: Makarin, Rusydi Hasan, et al.
Published: (2011)
Implementing cryptography in database
by: Kwan, Shong Hann
Published: (2010)
by: Kwan, Shong Hann
Published: (2010)
The power of quantum computer and its limitations
by: Mohd, Siti Munirah, et al.
Published: (2017)
by: Mohd, Siti Munirah, et al.
Published: (2017)
Method for use in quantum cryptography
by: Sellami , Ali, et al.
Published: (2010)
by: Sellami , Ali, et al.
Published: (2010)
Cryptography: past, present and future
Published: (2011)
Published: (2011)
Use of Cryptography in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2013)
by: Jaber, Aws Naser, et al.
Published: (2013)
Extention and cryptanalysis of golden cryptography
by: Sharabyan, Mohammad Tahghighi
Published: (2015)
by: Sharabyan, Mohammad Tahghighi
Published: (2015)
Pembangunan dan penilaian model hasrat mengguna aplikasi mudah alih penasihatan penyakit panaman lada hitam
by: Kamarudin, Shafinah, et al.
Published: (2018)
by: Kamarudin, Shafinah, et al.
Published: (2018)
A review on multimedia communications cryptography
by: Salem, Yasser, et al.
Published: (2011)
by: Salem, Yasser, et al.
Published: (2011)
Coding, cryptography, information security and OFDM
Published: (2011)
Published: (2011)
Topics in coding, cryptography and information security
Published: (2011)
Published: (2011)
A survey on elliptic curve cryptography
by: Mohamed, Mohamad Afendee
Published: (2014)
by: Mohamed, Mohamad Afendee
Published: (2014)
Large Integer Arithmetic in GPU for Cryptography
by: Lee, Wen Dick
Published: (2017)
by: Lee, Wen Dick
Published: (2017)
Pembangunan dan penilaian model hasrat mengguna aplikasi mudah alih penasihatan penyakit tanaman lada hitam
by: Shafinah Kamarudin,, et al.
Published: (2018)
by: Shafinah Kamarudin,, et al.
Published: (2018)
Decision-making analysis using arduino-based Electroencephalography (EEG): an exploratory study for marketing strategy
by: Yazid, Ahmad Faiz, et al.
Published: (2020)
by: Yazid, Ahmad Faiz, et al.
Published: (2020)
Randomized text encryption: a new dimension in cryptography
by: Memon, Jamshed, et al.
Published: (2014)
by: Memon, Jamshed, et al.
Published: (2014)
Musical Cryptography: Codes, Ciphers, Form, and Function
by: Thompson, Benjamin
Published: (2024)
by: Thompson, Benjamin
Published: (2024)
Public key cryptography in resource-constrained WSN
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
Cryptography, Steganography, & Digital Watermarking for Text Documentation
by: Nurul Suzulyana, Zulkifley, et al.
Published: (2020)
by: Nurul Suzulyana, Zulkifley, et al.
Published: (2020)
Finite and infinite field cryptography analysis and applications
by: Mohammed G. Al-Saidi, Nadia, et al.
Published: (2012)
by: Mohammed G. Al-Saidi, Nadia, et al.
Published: (2012)
Quantum Chaotic Cryptography : A New Approach
by: Akhshani, Afshin
Published: (2015)
by: Akhshani, Afshin
Published: (2015)
CSC 535 � CRYPTOGRAPHY FEB 99.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1999)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1999)
An e-voting application using cryptography technology
by: Chin, Hsin Tien
Published: (2020)
by: Chin, Hsin Tien
Published: (2020)
RISC32-E cryptography performance evaluation
by: Teo, Sei Hau
Published: (2022)
by: Teo, Sei Hau
Published: (2022)
Quantum Cryptography Experiment using Optical Devices
by: Azahari, Nur Shahirah, et al.
Published: (2023)
by: Azahari, Nur Shahirah, et al.
Published: (2023)
Quantum Cryptography Experiment using Optical Devices
by: Azahar, Nur Shahirah, et al.
Published: (2023)
by: Azahar, Nur Shahirah, et al.
Published: (2023)
Quantum Cryptography Experiment using Optical Devices
by: Azahari, Nur Shahirah, et al.
Published: (2023)
by: Azahari, Nur Shahirah, et al.
Published: (2023)
Quantum Cryptography Experiment using Opticalb Devices
by: Azahari, Nur Shahirah, et al.
Published: (2023)
by: Azahari, Nur Shahirah, et al.
Published: (2023)
Quantum Cryptography Experiment using Optical Devices
by: Azahari, Nur Shahirah, et al.
Published: (2023)
by: Azahari, Nur Shahirah, et al.
Published: (2023)
Similar Items
-
Practical cryptography: algorithms and implementations using C++
Published: (2014) -
Scalar multiplication via elliptic nets with application to cryptography
by: Muslim, Norliana, et al.
Published: (2018) -
Chaos Based Cryptography An Alternative to Algebraic Cryptography
by: Kamel Ariffin, Muhammad Rezal
Published: (2008) -
Communications cryptography
by: Khalifa, Othman Omran, et al.
Published: (2004) -
Quantum cryptography
by: Messikh, Azeddin
Published: (2011)