Author of the publication

Training Teachers to Integrate Computational Thinking into K-12 Teaching.

, , , and . SIGCSE, page 156-157. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modules for Integrating Cryptography in Introductory CS and Computer Security Courses (Abstract Only).. SIGCSE, page 738. ACM, (2017)Extracting the Security Features Implemented in a Bluetooth LE Connection., , and . IEEE BigData, page 2559-2563. IEEE, (2018)Developing and Implementing a Cybersecurity Course for Middle School., and . NCS, volume 1055 of Advances in Intelligent Systems and Computing, page 75-84. Springer, (2019)Private Blockchain for Visitor Authentication and Access Control., , and . IEEE BigData, page 5580-5586. IEEE, (2021)Quadrivium: A Trivium-Inspired Pseudorandom Number Generator., and . Int. J. Netw. Secur., 21 (6): 985-992 (2019)Physical Unclonable Function and Hashing Are All You Need to Mutually Authenticate IoT Devices., , and . Sensors, 20 (16): 4361 (2020)Training Teachers to Integrate Computational Thinking into K-12 Teaching., , , and . SIGCSE, page 156-157. ACM, (2016)Physical Visitor Access Control and Authentication Using Blockchain, Smart Contracts and Internet of Things., , , and . Cryptogr., 6 (4): 65 (2022)A New Key Agreement Scheme Based on the Triple Decomposition Problem.. Int. J. Netw. Secur., 16 (6): 426-436 (2014)On the Security of Bluetooth Low Energy in Two Consumer Wearable Heart Rate Monitors/Sensing Devices., , and . Sensors, 22 (3): 988 (2022)