Needham Center

Results: 11



#Item
1Education / Educational psychology / Distance education / Educational technology / Pedagogy / Curricula / Asynchronous learning / Learning / Active learning / Social presence theory / Instructional design / Assessment in computer-supported collaborative learning

Swan, KLearning effectiveness: what the research tells us. In J. Bourne & J. C. Moore (Eds) Elements of Quality Online Education, Practice and Direction. Needham, MA: Sloan Center for Online Education, L

Add to Reading List

Source URL: cguevara.commons.gc.cuny.edu

Language: English - Date: 2010-12-06 11:30:12
2Server / Server hardware / Email / File server / Internet Relay Chat / Session / Domain Name System / Publishsubscribe pattern

Experience with Grapevine: The Growth of a Distributed System MICHAEL D. SCHROEDER, ANDREW D. BIRRELL, and ROGER M. NEEDHAM Xerox Palo Alto Research Center

Add to Reading List

Source URL: www.eecs.harvard.edu

Language: English
3

Prudent Engineering Practice for Cryptographic Protocols Martn Abadi and Roger Needham November 1, 1995 Martn Abadi is at the Systems Research Center, Digital Equipment Corporation, 130 Lytton Avenue, Palo Alto, CA

Add to Reading List

Source URL: users.ece.cmu.edu

- Date: 2004-09-25 11:38:53
    4Needham /  Massachusetts / Volusia County /  Florida

    Minutes of the Volusia County Library Advisory Board Meeting January 11th , 2013 Library Support Center Membe rs: Staff: Claudia Hutchins, At-Large

    Add to Reading List

    Source URL: volusialibrary.org

    Language: English - Date: 2014-01-07 14:34:56
    5Cyberwarfare / Cryptographic protocols / Computer security / Kerberos / Key distribution center / Needham–Schroeder protocol / Key / Cryptographic nonce / Woo–Lam / Cryptography / Computer network security / Key management

    Lecture 10: Key Distribution for Symmetric Key Cryptography and Generating Random Numbers Lecture Notes on “Computer and Network Security” by Avi Kak () February 17, :26am

    Add to Reading List

    Source URL: engineering.purdue.edu

    Language: English - Date: 2015-02-17 00:27:22
    6Cyberwarfare / Kerberos / Ticket / Challenge-response authentication / Alice and Bob / Key distribution center / Public-key cryptography / Needham–Schroeder protocol / Neuman–Stubblebine protocol / Cryptography / Computer network security / Cryptographic protocols

    YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CPSC 467a: Cryptography and Computer Security Notes 24 (rev. 1) December 1, 2005

    Add to Reading List

    Source URL: zoo.cs.yale.edu

    Language: English - Date: 2005-12-06 23:10:45
    7Internet / Email / Internet protocols / Usenet / IBM Lotus Notes / Windows Server / Computing / Server / Server hardware

    Experience with Grapevine: The Growth of a Distributed System MICHAEL D. SCHROEDER, ANDREW D. BIRRELL, and ROGER M. NEEDHAM Xerox Palo Alto Research Center

    Add to Reading List

    Source URL: birrell.org

    Language: English - Date: 2002-05-28 16:39:34
    8Needham /  Massachusetts / Geography of the United States / Needham Junction / Needham Center / Needham Heights / Watertown /  Wisconsin / Newtonville / Watertown /  South Dakota / Geography of South Dakota / Charles River / Newton /  Massachusetts / Newton and Boston Street Railway

    PDF Document

    Add to Reading List

    Source URL: www.mbta.com

    Language: English - Date: 2014-12-27 00:16:23
    9Endocrine disruptors / Antibiotics / Antifungals / Organochlorides / Triclosan / Biomonitoring / Antibacterial soap / Hand washing / Phthalate / Chemistry / Biology / Analytical chemistry

    Research Urinary Concentrations of Triclosan in the U.S. Population: 2003–2004 Antonia M. Calafat, Xiaoyun Ye, Lee-Yang Wong, John A. Reidy, and Larry L. Needham Division of Laboratory Sciences, National Center for Env

    Add to Reading List

    Source URL: www.ncbi.nlm.nih.gov

    Language: English
    10Cyberwarfare / Kerberos / Computing / Cryptographic protocols / Key distribution center / Ticket Granting Ticket / Ticket / Needham–Schroeder protocol / Computer network security / Key management / Computer security

    Kerberos for Internet-of-Things IETF89 Thomas Hardjono MIT Kerberos & Internet Trust Consortium February, 2014

    Add to Reading List

    Source URL: www.tschofenig.priv.at

    Language: English - Date: 2014-03-04 10:40:45
    UPDATE