National Teaching Symposium on Cryptology and Information Security (NTSCIS 2010 E-BOOK)

Kunming,China,8.8-8.9,2010

ISBN: 978-1-935068-09-9 Scientific Research Publishing, USA

E-Book 469pp Pub. Date: August 2010

Category: Computer Science & Communications

Price: $80

2010 年全国密码学与信息安全教学研讨会于2010 年8 月8 日-9 日在云南大学召开。本次会议自2010 年2 月开始广泛征稿以来,截止7 月中旬,共收到稿件500 多篇。论文范围涉及到教学改革的各个方面,学术委员会组织专家对收到的论文进行评审,最终出版论文集,其中100 多篇论文收录至《2010National Teaching Seminar on Cryptography and Information Security (2010NTS-CIS)2010 年全国密码学与信息安全教学研讨会论文集》,所有的文章均送检ISTP。

Study and Practice on the Course teaching of Information Secu rity Introduction 1
Research on Teaching Method of Applied Cryptography Oriented towards Cultivation of Application Type Talents 6
The Research of Characteristic Improving the Quality of Graduation Thesis on Information Security 11
Individual Sports’ Theoretical Exploration of Public Institution Staff 15
Research of Bilingual Teaching in Information Security Subject of University 19
Discussion on Talent Cultivation of Information Security in University 22
Analysis of Social Needs and Employment Situation on Safety Engineering Specialty 25
Plain analysis on pluses and minuses of university education under the guidance of employment 29
Research on Self-regulated Learning based for the Guide Schema of the Undergraduates' designing for graduation 33
On the College Ideological and Political Work under Information Age 38
Comparative Study on Choosing Employment Viewpoint of Students from Wenzhou Vocational Colleges and Vocational Schools 41
Teaching Reform of Computer Courses for Non-computer Specialty Students 45
The Thought of Physical Education Program of Talents in Shaanxi Provincial 48
Research on teaching reform about computer network of the information security professional 51
Exploration of Electrical Characteristics of Information Security Personnel Training Mode 54
Research the Essential Property of Information Security and It’s Talents Characteristic 59
The Thinking for a Bilingual Teaching about Courses of Speciality in Information Security of Universities 63
A Novel Digital Library Personalized Service Scheme 66
A Multi-Level Protection Strategy of Information Security for Digital Library 69
The cryptology teaching discuss 73
Teaching Reform on the Course of Measurement & Control Instrument Network Technology 77
Practicing and Understanding on the Construction of Information Security Course Group 80
Discussion on Teaching Methods in Profession of Electronic Information Engineering 84
Modern EDA Technology and its Application in Didactical Practice of College 88
Study on Characteristic Curriculum Teaching Reform about Wireless Communication Security Technology 91
Implementing Paper Reading in Class Teaching 94
Learning experience on applying car model into the course of information theory and coding 98
Dynamic Optimal Algorithms Based on Buffers for Store-Forward Deadlock Avoidance 102
Research on Mathematics Teaching in Cryptography 107
The Teaching Method Reform's Exploration of Random Signal Processing Course 111
Study of research teaching method of in the finite field teaching 114
The research of Network Attack and Defense Training Based on Enterprise Scenario Teaching 117
Exploration of Practice Teaching of Information Security Specialty 121
Study and Practice on Teaching “Cryptology in Computer Networks” 125
Several Teaching Reform Consideration of Automation 129
Research on Network Ideological and Political Education Work in the Background of University Information Construction 131
Issues on the practice of Information Security curriculum development 136
the Discussion of Information System Security Risk Assessment Course Teaching 139
Discussion on teaching of bilingual course Network Computer 143
Guidance of College Students Innovation Experiment Using Systems Engineering 146
Research on Teaching Model of Information Security Experimental Course 150
On Several Understandings of Reform in Teaching Discrete Mathematics 153
On the Development Project of the Major of Information security in Guangzhou University 156
Construction and Reflection on the Course of Brief Introduction of Information Security 160
Empirical Study on Exploitation by the Controlling Shareholder and Transaction on Limited Deviation 164
Three Elements in the Teaching of “The Basic of Math for Information Security” 168
Design and Application of Moot Court in Course Teaching of Information Security Laws and Regulations 171
A Study of Construction of Information Security Course System in Computer Science Specialty 175
The Study on the Question-situation Teaching Method 180
The Course Construction and Educational Reform of “Fundamentals of Cryptography” 184
On the training and modeling for the teaching ability of university teachers 188
Problems and Countermeasures for Applied undergraduate colleges and universities information security major graduation project 190
Teaching Method Reform Attempt of Information Security Course 194
Some Perception in Teaching Process of RSA 198
A through information security course system based on knowledge module 202
The Teaching Reform of E-commerce Security Course 205
Computer Network Teaching Reform In Information Security Major 208
Practical Teaching System Studying of Information Security Speciality 213
Research on Teaching Methods and Contents of Public Security Institutions “Network Attack and Defense Technology” Course 216
Research on procedure-effective teaching mode 220
The RSA based on Gaussian integer domain 224
Educational philosophy of life’s Research in College Physical Education 227
Teaching Method in Normal Form 231
An Exploration of the Practice Teaching of Cryptography in the Discipline of Information Engineering 234
Construction and Reform of the Technology and Theory of Information Hiding 238
Construction and Practice on Curriculum System of Cryptographic Engineering and Application 241
Design and Implementation of University Logistics Information Web Platform 245
The Network Security Experiment Curriculum Content Establishment and the Teaching Form Discussion 249
Research on Teaching Reform of Combining Cryptographic Theory with Its Engineering Applicaton 253
Considerations of Some relations in Course of Computer Networks 257
Study and Practice of Teaching “Mathematical Knowledge in Information Security” 260
Construction and Development of Applied Mathematics Course for Information security Major 263
A Teaching Scheme of Information Based Teaching in Career Education 266
Cryptography Course Research and Practice for Junior College 270
Exploration on teaching of“Cryptology” 273
Information security teaching team construction experience 275
Comprehensive Experimental Research and Practice of the“Operating System Experimental”Teaching 279
Thinking on Graduation Design of Network Safety 283
Teaching Reform and Consideration on Safety Engineering Specialty 286
Exploration on the Teaching Methods of Modern Cryptography Course 291
The Discussion on Heuristic Teaching Method Based Cases of Information Security and Keeping Secrets 294
Application and discussion of cloud computing in universities 298
Exploring the Achievement of Information Equivalence in EST Translation of Long Sentences 302
Information Security Undergraduate Construction in Xinjiang University 306
Exploration and Research on Network Confrontation Practice Teaching Based on Virtual Machine 311
A Research and Implementation of SSL-based Data Transmission System 315
Analyze the Theory and Practice of Bilingual Teaching of Circuit Theory in Agriculture College 318
Research on seminar teaching of information security for postgraduates 321
The Application of Intuitional Instruction in Numerical Computation Based on MATLAB 324
Method of Load balance of Web Server 328
Research on Sharing of Distributed Educational Resources Based on Web Service 333
Research on the Blend of Local Engineering Academy Humanism Education and Engineering Technology Education 337
Exploration on the Practice Teaching System of the Major of Information Security 340
Discussion on the Role of Assembly Language Course in Information Security Training 343
Research on the Experiment Teaching Method for the Information Security Major Based on the Educational Psychology 346
Exploration of Inquiry-based Teaching Mode of “Applied Cryptography” 349
The teaching reform exploration in discrete mathematics of information security profession 354
Study of Practice Teaching and Ability Cultivating on Information Security Professional 356
Exploration and Practice of Cultivating Modern Engineers, Who are Serving for Production Line 359
On the Cultivation of Students’ Sense of Dominant Position in College PE Selective Courses 363
Establish and Practice of Degree Course for Graduate in Information Science: Numerical Analysis 367
Briefly discuss on the Appreciation service of education and innovation of Education Training 371
Data Mining Based on Clouds Computing 374
Teaching Research and Simulation of The Sampling Theorem Based on MATLAB GUI 379
Using the RC4 encryption algorithm at the server 383
Designing Practice Courses Based on Open Source Software For Information Security Students 387
The Research and Analysis of Teacher’s Living Quality Level in Local College 392
“San Hua” Different-Step Teaching and Cultivation of College Student’s Creativity 395
How to implement principle of individualized instruction in basic subjects of medicine on popularization of higher education 400
Teaching Mathematical Logic for Information Security Specialty 405
The safety research of computer testing system 409
Design of Security Inspection in Network 413
A Multimedia Copyright Protection Protocol Based on Digital Watermarking and Digital Signature 417
Analysis on Security Strategy of Double-factor Authentication in Unified Logistics Information System 421
Construction of the Unified Logistics CRM Information System Platform 426
Computer Network Training of School-enterprise Cooperation Program 431
Study on Key Factors of Information Security Experiment Teaching System 435
Study on Information Security Experiment’s Innovation and Practice Teaching System 438
Yixian Yang, Information Security Center, Beijing University of Posts and Telecommunications
Free SCIRP Newsletters
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top