004 Datenverarbeitung; Informatik
Refine
Has Fulltext
- yes (111)
Year of publication
Document Type
- Article (102)
- Conference Proceeding (3)
- Doctoral Thesis (3)
- Master's Thesis (2)
- Preprint (1)
Is part of the Bibliography
- no (111) (remove)
Keywords
- Didaktik (13)
- Ausbildung (12)
- Hochschuldidaktik (12)
- Informatik (12)
- Computer Science Education (4)
- Competence Measurement (3)
- Secondary Education (3)
- Automatisches Beweisen (2)
- Big Data (2)
- Competence Modelling (2)
- Computational thinking (2)
- DPLL (2)
- Data Privacy (2)
- E-Learning (2)
- Informatics Education (2)
- Informatics Modelling (2)
- Informatics System Application (2)
- Informatics System Comprehension (2)
- Klausellernen (2)
- Relevanz (2)
- SAT (2)
- Theorembeweisen (2)
- Unifikation (2)
- education (2)
- relevance (2)
- theorem (2)
- 21st century skills, (1)
- ABRACADABRA (1)
- ARCS Modell (1)
- Achievement (1)
- Activity Theory (1)
- Activity-orientated Learning (1)
- Arduino (1)
- Aspect-Oriented Programming (1)
- Aspektorientierte Programmierung (1)
- Audience Response Systeme (1)
- Austria (1)
- Authentifizierung (1)
- Automated Theorem Proving (1)
- Blended Learning (1)
- Bloom’s Taxonomy (1)
- CS concepts (1)
- Capability approach (1)
- Challenges (1)
- Clause Learning (1)
- Cloud Computing (1)
- Cloud computing (1)
- Cognitive Skills (1)
- Competences (1)
- Competencies (1)
- Computational Thinking (1)
- Computer Science (1)
- Computer Science in Context (1)
- Computing (1)
- Constraint Solving (1)
- Contest (1)
- Contextualisation (1)
- Contradictions (1)
- Curriculum (1)
- Curriculum Development (1)
- Data Analysis (1)
- Data Management (1)
- Databases (1)
- Datenschutz (1)
- Deduction (1)
- Digital Competence (1)
- Digital Education (1)
- Digital Revolution (1)
- Dynamic assessment (1)
- Early Literacy (1)
- Educational Standards (1)
- Educational software (1)
- Embedded Systems (1)
- Euclid’s algorithm (1)
- Facebook (1)
- Fibonacci numbers (1)
- Function (1)
- Fundamental Ideas (1)
- Graphensuche (1)
- HCI (1)
- ICT Competence (1)
- ICT competencies (1)
- ICT skills (1)
- Informatics (1)
- Inquiry-based Learning (1)
- Internet applications (1)
- Internetanwendungen (1)
- Java Security Framework (1)
- Key Competencies (1)
- Kompetenzerwerb (1)
- Kryptographie (1)
- LMS (1)
- Learners (1)
- Learning Fields (1)
- Learning ecology (1)
- Learning interfaces development (1)
- Learning with ICT (1)
- Lehrer*innenbildung (1)
- Leistungsfähigkeit (1)
- Lern-App (1)
- Lernmotivation (1)
- Liguistisch (1)
- Logarithm (1)
- Logic Programming (1)
- Logics (1)
- Logikkalkül (1)
- Lower Secondary Level (1)
- MOOCs (1)
- Massive Open Online Courses (1)
- Measurement (1)
- Mensch-Computer-Interaktion (1)
- Music Technology (1)
- Natural Science Education (1)
- Netzwerk (1)
- NoSQL (1)
- Norway (1)
- Novice programmers (1)
- OpenOLAT (1)
- Optimization (1)
- Owner-Retained Access Control (ORAC) (1)
- Pedagogical content knowledge (1)
- Performance (1)
- Physical Science (1)
- Planing (1)
- Policy Languages (1)
- Policy Sprachen (1)
- Preprocessing (1)
- Problem Solving (1)
- Quantenkryptographie (1)
- Recommendations for CS-Curricula in Higher Education (1)
- Scalability (1)
- Selektion (1)
- Sensors (1)
- Skalierbarkeit (1)
- Small Private Online Courses (1)
- Social (1)
- Strategie (1)
- Tasks (1)
- Teacher perceptions (1)
- Teachers (1)
- Teaching information security (1)
- Technology proficiency (1)
- Terminology (1)
- Tests (1)
- Theory (1)
- Vocational Education (1)
- Weiterbildung (1)
- Young People (1)
- abstraction (1)
- analogical thinking (1)
- assistive Technologien (1)
- assistive technologies (1)
- authentication (1)
- automated theorem proving (1)
- binary representation (1)
- binary search (1)
- classroom language (1)
- clause learning (1)
- cognitive modifiability (1)
- competence (1)
- competencies (1)
- competency (1)
- complexity (1)
- comprehension (1)
- computational thinking (1)
- computer science education (1)
- computer science teachers (1)
- cryptography (1)
- cs4fn (1)
- curriculum theory (1)
- didactics (1)
- didaktisches Konzept (1)
- digitale Bildung (1)
- divide and conquer (1)
- e-mentoring (1)
- education and public policy (1)
- educational programming (1)
- edutainment (1)
- environments (1)
- exponentiation (1)
- fun (1)
- graph-search (1)
- high school (1)
- higher (1)
- higher education (1)
- informatics (1)
- informatics education (1)
- innovation (1)
- interactive course (1)
- interactive workshop (1)
- key competencies (1)
- kinaesthetic teaching (1)
- klinisch-praktischer Unterricht (1)
- learning (1)
- linguistic (1)
- logical calculus (1)
- mediated learning experience (1)
- mobiles Lernen (1)
- multiuser (1)
- network (1)
- networks (1)
- online assistance (1)
- open learning (1)
- operating system (1)
- parameter (1)
- pedagogy (1)
- personal (1)
- personal response systems (1)
- philosophical foundation of informatics pedagogy (1)
- pre-primary level (1)
- preprocessing (1)
- primary education (1)
- primary level (1)
- problem-solving (1)
- professional development (1)
- programming (1)
- programming in context (1)
- proving (1)
- quantum cryptography (1)
- secondary computer science education (1)
- secondary education (1)
- selection (1)
- self-efficacy (1)
- sign language (1)
- social media (1)
- student activation (1)
- student experience (1)
- student perceptions (1)
- students’ conceptions (1)
- students’ knowledge (1)
- teacher competencies (1)
- teaching informatics in general education (1)
- technische Rahmenbedingungen (1)
- tools (1)
- tracing (1)
- unification (1)
- user interfaces (1)
- user-centred (1)
- virtual reality (1)
- ‘unplugged’ computing (1)
Institute
- Institut für Informatik und Computational Science (111) (remove)
Three quantum cryptographic protocols of multiuser quantum networks with embedded authentication, allowing quantum key distribution or quantum direct communication, are discussed in this work. The security of the protocols against different types of attacks is analysed with a focus on various impersonation attacks and the man-in-the-middle attack. On the basis of the security analyses several improvements are suggested and implemented in order to adjust the investigated vulnerabilities. Furthermore, the impact of the eavesdropping test procedure on impersonation attacks is outlined. The framework of a general eavesdropping test is proposed to provide additional protection against security risks in impersonation attacks.