{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T19:57:40Z","timestamp":1769284660139,"version":"3.49.0"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,3,28]],"date-time":"2022-03-28T00:00:00Z","timestamp":1648425600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,3,28]],"date-time":"2022-03-28T00:00:00Z","timestamp":1648425600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,3,28]]},"DOI":"10.1109\/educon52537.2022.9766379","type":"proceedings-article","created":{"date-parts":[[2022,5,11]],"date-time":"2022-05-11T20:32:32Z","timestamp":1652301152000},"page":"620-627","source":"Crossref","is-referenced-by-count":4,"title":["A Tangible-Tool-Based Lesson Plan on Cipher Key Exchange Protocol for Early-Stage Learners"],"prefix":"10.1109","author":[{"given":"M. Fahim Ferdous","family":"Khan","sequence":"first","affiliation":[{"name":"Toyo University,Faculty of Information Networking for Innovation and Design (INIAD),Tokyo,Japan"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Damar Masato","family":"Hadisumarto","sequence":"additional","affiliation":[{"name":"Toyo University,Faculty of Information Networking for Innovation and Design (INIAD),Tokyo,Japan"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ken","family":"Sakamura","sequence":"additional","affiliation":[{"name":"Toyo University,Faculty of Information Networking for Innovation and Design (INIAD),Tokyo,Japan"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref10","first-page":"91","article-title":"Teaching Computer Science concepts","author":"curzon","year":"2018","journal-title":"Computer Science Education Perspectives on Teaching and learning in school"},{"key":"ref11","article-title":"Making the Invisible Tangible: Learning Biological Engineering in Kindergarten","volume":"20","author":"shaer","year":"0","journal-title":"Proc ACM CHI Workshop on User Interface Technology and Educational Pedagogy"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-34805-0_60"},{"key":"ref14","article-title":"Computer Science Unplugged &#x2013; An enrichment and extension programme for primary-aged children","author":"bell","year":"2022"},{"key":"ref15","first-page":"9","article-title":"Combinatorially based cryptography for children (and adults)","volume":"99","author":"fellows","year":"1994","journal-title":"Congressus Numerantium"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1080\/01611194.2016.1238422"},{"key":"ref17","first-page":"297","article-title":"AlgoBlock: a tangible programming language, a tool for collaborative learning","author":"suzuki","year":"1993","journal-title":"Proc Of the 4th European Logo Conference"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-004-0295-6"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1226969.1227003"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3457195"},{"key":"ref3","year":"2022","journal-title":"Informatics Education in Europe Are We All in the Same Boat?"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.15388\/infedu.2020.25"},{"key":"ref5","first-page":"342","article-title":"Constructing computational thinking without using computers","volume":"14","author":"bell","year":"2019","journal-title":"Vrije Universiteit Brussel in Special Issue on Constructionism and Computational Thinking Constructivist Foundations"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1240866.1240933"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3137065.3137072"},{"key":"ref2","year":"2022","journal-title":"K&#x2013;12 computer science framework"},{"key":"ref1","article-title":"Schools of the Future Defining New Models of Education for the Fourth Industrial Revolution","author":"forum","year":"2022"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3286689.3286714"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-49108-6_22"},{"key":"ref22","year":"2022","journal-title":"Secret Key Exchange (Diffie-Hellman) &#x2013; Computerphile"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s10956-020-09817-9"},{"key":"ref24","year":"2019","journal-title":"Raspberry Pi 3 Model B Datasheet"},{"key":"ref23","year":"2022","journal-title":"Public key cryptography - Diffie-Hellman Key Exchange (full version)"}],"event":{"name":"2022 IEEE Global Engineering Education Conference (EDUCON)","location":"Tunis, Tunisia","start":{"date-parts":[[2022,3,28]]},"end":{"date-parts":[[2022,3,31]]}},"container-title":["2022 IEEE Global Engineering Education Conference (EDUCON)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9766427\/9766377\/09766379.pdf?arnumber=9766379","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,20]],"date-time":"2022-06-20T21:16:50Z","timestamp":1655759810000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9766379\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,28]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/educon52537.2022.9766379","relation":{},"subject":[],"published":{"date-parts":[[2022,3,28]]}}}