{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,26]],"date-time":"2025-10-26T15:05:36Z","timestamp":1761491136765,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,28]],"date-time":"2020-10-28T00:00:00Z","timestamp":1603843200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,28]]},"DOI":"10.1145\/3421590.3421630","type":"proceedings-article","created":{"date-parts":[[2020,11,25]],"date-time":"2020-11-25T05:22:00Z","timestamp":1606281720000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Keeping secrets"],"prefix":"10.1145","author":[{"given":"Anke","family":"Lindmeier","sequence":"first","affiliation":[{"name":"Friedrich Schiller University Jena, Jena, Germany"}]},{"given":"Andreas","family":"M\u00fchling","sequence":"additional","affiliation":[{"name":"Kiel University, Kiel, Germany"}]}],"member":"320","published-online":{"date-parts":[[2020,10,28]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2978249.2978259"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Thomas Borys. 2011. Codierung und Kryptologie. Springer.  Thomas Borys. 2011. Codierung und Kryptologie. Springer.","DOI":"10.1007\/978-3-8348-8252-3"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3279720.3279723"},{"key":"e_1_3_2_1_4_1","unstructured":"Stephanie Carretero Riina Vuorikari and Yves Punie. 2017. DigComp 2.1: The digital competence framework for citizens with eight proficiency levels and examples of use. EUR Scientific and technical research series Vol. 28558. Publications Office Luxembourg.  Stephanie Carretero Riina Vuorikari and Yves Punie. 2017. DigComp 2.1: The digital competence framework for citizens with eight proficiency levels and examples of use. EUR Scientific and technical research series Vol. 28558. Publications Office Luxembourg."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3241815.3241883"},{"volume-title":"2019 IEEE European Symposium on Security and Privacy (EuroS P). 401--415","author":"Dechand S.","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1080\/01449299308924399"},{"key":"e_1_3_2_1_8_1","unstructured":"Department for Education. 2013. Computing Programmes of Study: Key Stages 1 and 2.  Department for Education. 2013. Computing Programmes of Study: Key Stages 1 and 2."},{"key":"e_1_3_2_1_9_1","unstructured":"Department for Education. 2013. Computing Programmes of Study: Key Stages 3 and 4.  Department for Education. 2013. Computing Programmes of Study: Key Stages 3 and 4."},{"key":"e_1_3_2_1_10_1","unstructured":"Arbeitskreis Bildungsstandards SII der Gesellschaft f\u00fcr Informatik e. V. 2016. Bildungsstandards Informatik f\u00fcr die Sekundarstufe II. Log in 36 183\/184 (2016).  Arbeitskreis Bildungsstandards SII der Gesellschaft f\u00fcr Informatik e. V. 2016. Bildungsstandards Informatik f\u00fcr die Sekundarstufe II. Log in 36 183\/184 (2016)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2401796.2401823"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2401796.2401804"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2481449.2481477"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352135.1352234"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3265757.3265789"},{"key":"e_1_3_2_1_16_1","unstructured":"K12 Computer Science Framework Steering Committee. 2016. K12 Computer Science Framework. Association for Computing Machinery New York. http:\/\/www.k12cs.org  K12 Computer Science Framework Steering Committee. 2016. K12 Computer Science Framework. Association for Computing Machinery New York. http:\/\/www.k12cs.org"},{"volume-title":"My Data Just Goes Everywhere: User Mental Models of the Internet and Implications for Privacy and Security. In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015","year":"2015","author":"Kang Ruogu","key":"e_1_3_2_1_17_1"},{"volume-title":"Zoom Meetings Aren't End-to-End Encrypted, Despite Misleading Marketing. The Intercept (31","year":"2020","author":"Lee Micah","key":"e_1_3_2_1_18_1"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcci.2018.11.003"},{"volume-title":"Proceedings of European Symposium on Security and Privacy. http:\/\/www.ieee-security.org\/TC\/EuroSP2016\/posters\/number18","year":"2016","author":"Naiakshina Alena","key":"e_1_3_2_1_20_1"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.12973\/ejmste\/75414"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10639-005-3431-7"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2532748.2532770"},{"key":"e_1_3_2_1_24_1","unstructured":"Nicole Perlroth. 19.11.2019. What Is End-to-End Encryption? Another Bull's-Eye on Big Tech. The New York Times (19.11.2019). https:\/\/www.nytimes.com\/2019\/11\/19\/technology\/end-to-end-encryption.html  Nicole Perlroth. 19.11.2019. What Is End-to-End Encryption? Another Bull's-Eye on Big Tech. The New York Times (19.11.2019). https:\/\/www.nytimes.com\/2019\/11\/19\/technology\/end-to-end-encryption.html"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837125"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2073276.2073283"},{"volume-title":"Exploring Mental Models of Encryption. In Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018","year":"2018","author":"Wu Justin","key":"e_1_3_2_1_27_1"}],"event":{"name":"WiPSCE '20: Workshop in Primary and Secondary Computing Education","acronym":"WiPSCE '20","location":"Virtual Event Germany"},"container-title":["Proceedings of the 15th Workshop on Primary and Secondary Computing Education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3421590.3421630","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3421590.3421630","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:46Z","timestamp":1750200106000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3421590.3421630"}},"subtitle":["K-12 students' understanding of cryptography"],"short-title":[],"issued":{"date-parts":[[2020,10,28]]},"references-count":27,"alternative-id":["10.1145\/3421590.3421630","10.1145\/3421590"],"URL":"https:\/\/doi.org\/10.1145\/3421590.3421630","relation":{},"subject":[],"published":{"date-parts":[[2020,10,28]]},"assertion":[{"value":"2020-10-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}