{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:48:47Z","timestamp":1740098927040,"version":"3.37.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319668048"},{"type":"electronic","value":"9783319668055"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-66805-5_8","type":"book-chapter","created":{"date-parts":[[2017,8,25]],"date-time":"2017-08-25T14:35:21Z","timestamp":1503671721000},"page":"65-72","source":"Crossref","is-referenced-by-count":0,"title":["Cooperative Learning in Information Security Education: Teaching Secret Sharing Concepts"],"prefix":"10.1007","author":[{"given":"Yang-Wai","family":"Chow","sequence":"first","affiliation":[]},{"given":"Willy","family":"Susilo","sequence":"additional","affiliation":[]},{"given":"Guomin","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,26]]},"reference":[{"key":"8_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/978-3-642-20901-7_2","volume-title":"Coding and Cryptology","author":"A Beimel","year":"2011","unstructured":"Beimel, A.: Secret-sharing schemes: a survey. In: Chee, Y.M., Guo, Z., Ling, S., Shao, F., Tang, Y., Wang, H., Xing, C. (eds.) IWCC 2011. LNCS, vol. 6639, pp. 11\u201346. Springer, Heidelberg (2011). doi: 10.1007\/978-3-642-20901-7_2"},{"issue":"1","key":"8_CR2","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1109\/MSP.2014.6","volume":"12","author":"P Bhattacharya","year":"2014","unstructured":"Bhattacharya, P., Yang, L., Guo, M., Qian, K., Yang, M.: Learning mobile security with labware. IEEE Secur. Priv. 12(1), 69\u201372 (2014)","journal-title":"IEEE Secur. Priv."},{"issue":"1","key":"8_CR3","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1109\/MSECP.2003.1176998","volume":"99","author":"M Bishop","year":"2003","unstructured":"Bishop, M.: What is computer security? IEEE Secur. Priv. 99(1), 67\u201369 (2003)","journal-title":"IEEE Secur. Priv."},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Blakley, G.: Safeguarding cryptographic keys. In: Proceedings of the 1979 AFIPS National Computer Conference, pp. 313\u2013317 (1979)","DOI":"10.1109\/MARK.1979.8817296"},{"key":"8_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1007\/978-3-642-34129-8_2","volume-title":"Information and Communications Security","author":"Y-W Chow","year":"2012","unstructured":"Chow, Y.-W., Susilo, W., Wong, D.S.: Enhancing the perceived visual quality of a size invariant visual cryptography scheme. In: Chim, T.W., Yuen, T.H. (eds.) ICICS 2012. LNCS, vol. 7618, pp. 10\u201321. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-34129-8_2"},{"key":"8_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1007\/978-3-319-40253-6_25","volume-title":"Information Security and Privacy","author":"Y-W Chow","year":"2016","unstructured":"Chow, Y.-W., Susilo, W., Yang, G., Phillips, J.G., Pranata, I., Barmawi, A.M.: Exploiting the error correction mechanism in QR codes for secret sharing. In: Liu, J.K.K., Steinfeld, R. (eds.) ACISP 2016. LNCS, vol. 9722, pp. 409\u2013425. Springer, Cham (2016). doi: 10.1007\/978-3-319-40253-6_25"},{"issue":"2","key":"8_CR7","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1016\/j.edurev.2010.02.002","volume":"5","author":"S Decuyper","year":"2010","unstructured":"Decuyper, S., Dochy, F., Van den Bossche, P.: Grasping the dynamic complexity of team learning: an integrative model for effective team learning in organisations. Educ. Res. Rev. 5(2), 111\u2013133 (2010)","journal-title":"Educ. Res. Rev."},{"key":"8_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1007\/978-3-319-39483-1_43","volume-title":"Learning and Collaboration Technologies","author":"M Ernits","year":"2016","unstructured":"Ernits, M., Kikkas, K.: A live virtual simulator for teaching cybersecurity to information technology students. In: Zaphiris, P., Ioannou, A. (eds.) LCT 2016. LNCS, vol. 9753, pp. 474\u2013486. Springer, Cham (2016). doi: 10.1007\/978-3-319-39483-1_43"},{"issue":"2","key":"8_CR9","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1080\/00405849909543834","volume":"38","author":"DW Johnson","year":"1999","unstructured":"Johnson, D.W., Johnson, R.T.: Making cooperative learning work. Theory Pract. 38(2), 67\u201373 (1999)","journal-title":"Theory Pract."},{"issue":"5","key":"8_CR10","doi-asserted-by":"crossref","first-page":"365","DOI":"10.3102\/0013189X09339057","volume":"38","author":"DW Johnson","year":"2009","unstructured":"Johnson, D.W., Johnson, R.T.: An educational psychology success story: social interdependence theory and cooperative learning. Educ. Res. 38(5), 365\u2013379 (2009)","journal-title":"Educ. Res."},{"key":"8_CR11","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1016\/j.edurev.2013.02.002","volume":"10","author":"E Kyndt","year":"2013","unstructured":"Kyndt, E., Raes, E., Lismont, B., Timmers, F., Cascallar, E., Dochy, F.: A meta-analysis of the effects of face-to-face cooperative learning. Do recent studies falsify or verify earlier findings? Educ. Res. Rev. 10, 133\u2013149 (2013)","journal-title":"Educ. Res. Rev."},{"key":"8_CR12","unstructured":"Locasto, M., Sinclair, S.: An experience report on undergraduate cyber-security education and outreach. In: Annual Conference on Education in Information Security (ACEIS) (2009)"},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Logan, P.Y., Clarkson, A.: Teaching students to hack: curriculum issues in information security. In: ACM SIGCSE Bulletin, vol. 37, pp. 157\u2013161. ACM (2005)","DOI":"10.1145\/1047344.1047405"},{"key":"8_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BFb0053419","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u201994","author":"M Naor","year":"1995","unstructured":"Naor, M., Shamir, A.: Visual cryptography. In: Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1\u201312. Springer, Heidelberg (1995). doi: 10.1007\/BFb0053419"},{"issue":"11","key":"8_CR15","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22(11), 612\u2013613 (1979)","journal-title":"Commun. ACM"},{"issue":"3","key":"8_CR16","doi-asserted-by":"crossref","first-page":"429","DOI":"10.1037\/0033-2909.94.3.429","volume":"94","author":"RE Slavin","year":"1983","unstructured":"Slavin, R.E.: When does cooperative learning increase student achievement? Psychol. Bull. 94(3), 429 (1983)","journal-title":"Psychol. Bull."},{"key":"8_CR17","unstructured":"Terry, C., Castellano, A., Harrod, J., Luke, J., Reichherzer, T.: The UWF cyber battle lab: a hands-on computer lab for teaching and research in cyber security. In: Proceedings of the International Conference on Security and Management (SAM), p. 1. The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp) (2014)"},{"key":"8_CR18","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/978-3-319-03656-4_16","volume-title":"Innovative Practices in Teaching Information Sciences and Technology","author":"D Wu","year":"2014","unstructured":"Wu, D., Fulmer, J., Johnson, S.: Teaching information security with virtual laboratories. In: Carroll, J.M. (ed.) Innovative Practices in Teaching Information Sciences and Technology, pp. 179\u2013192. Springer, Cham (2014). doi: 10.1007\/978-3-319-03656-4_16"},{"issue":"3","key":"8_CR19","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1109\/TE.2013.2282285","volume":"57","author":"L Xu","year":"2014","unstructured":"Xu, L., Huang, D., Tsai, W.-T.: Cloud-based virtual laboratory for network security education. IEEE Trans. Educ. 57(3), 145\u2013150 (2014)","journal-title":"IEEE Trans. Educ."}],"container-title":["Lecture Notes in Computer Science","Cooperative Design, Visualization, and Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-66805-5_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,2]],"date-time":"2019-10-02T16:32:18Z","timestamp":1570033938000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-66805-5_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319668048","9783319668055"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-66805-5_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}