Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Daniel Bosk"'
Publikováno v:
Education Sciences, Vol 14, Iss 8, p 882 (2024)
We have evaluated a new pedagogical approach, pure question-based learning, or rather, a modern, digitized version of a really old approach: the Socratic method of learning. The pedagogical approach was evaluated and improved using a design-based res
Externí odkaz:
https://doaj.org/article/3439bd69e22144818ec6b252ecd47dd5
Publikováno v:
2022 IEEE Frontiers in Education Conference (FIE).
Autor:
Daniel Bosk, Richard Glassey
Publikováno v:
ITiCSE (Working Group Reports)
The shift to meeting students online has made traditional forms of interaction difficult or impossible to replicate. In response, we suggest that teachers become co-pilots for each other: joining lectures and extending the abilities of a solo teacher
Publikováno v:
Cryptology and Network Security ISBN: 9783030654108
CANS
CANS
Distance-bounding anonymous credentials could be used for any location proofs that do not need to identify the prover and thus could make even notoriously invasive mechanisms such as location-based services privacy-preserving. There is, however, no s
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::38249172788a6725c5ec909ae1c56fd5
https://doi.org/10.1007/978-3-030-65411-5_8
https://doi.org/10.1007/978-3-030-65411-5_8
While current technologies, such as online social networks, can facilitate coordination and communication for protest organization, they can also endanger political activists when the control over ...
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ee02dfcfa6782ff66116d7d95be7e8e8
https://doi.org/10.4324/9781315212357-5
https://doi.org/10.4324/9781315212357-5
Autor:
Daniel Bosk, Sonja Buchegger
Publikováno v:
IFIP Advances in Information and Communication Technology ISBN: 9783319417622
Privacy and Identity Management
Privacy and Identity Management
In this paper, we focus on achieving privacy-preserving access control mechanisms for decentralized storage, primarily intended for an asynchronous message passing setting. We propose two modular constructions, one using a pull strategy and the other
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::67b92c4641b96f30d62b3cc476a5cbed
https://doi.org/10.1007/978-3-319-41763-9_22
https://doi.org/10.1007/978-3-319-41763-9_22
Publikováno v:
Secure IT Systems ISBN: 9783319265018
NordSec
NordSec
In this paper we first analyse the possibility for deniability under a strong adversary, who has an Internet-wide transcript of the communication. Secondly, we present a scheme which provides the desirable properties of previous messaging schemes, bu
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::40e8e1e414b45e43975840687ed6e910
https://doi.org/10.1007/978-3-319-26502-5_6
https://doi.org/10.1007/978-3-319-26502-5_6