Boštjan Brumen
Cited by
Cited by
A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion
M Turkanović, B Brumen, M Hölbl
Ad Hoc Networks 20, 96-112, 2014
Comparison of performance of Web services, WS-Security, RMI, and RMI–SSL
MB Juric, I Rozman, B Brumen, M Colnaric, M Hericko
Journal of Systems and Software 79 (5), 689-700, 2006
WSDL and UDDI extensions for version support in web services
MB Juric, A Sasa, B Brumen, I Rozman
Journal of Systems and Software 82 (8), 1326-1343, 2009
Brute-force and dictionary attack on hashed real-world passwords
L Bošnjak, J Sreš, B Brumen
2018 41st international convention on information and communication …, 2018
Perceived threat of COVID-19 and future travel avoidance: Results from an early convenient sample in Slovenia
M Turnšek, B Brumen, M Rangus, M Gorenak, J Mekinc, TL Štuhec
Academica Turistica-Tourism and Innovation Journal 13 (1), 2020
An improved two-party identity-based authenticated key agreement protocol using pairings
M Hölbl, T Welzer, B Brumen
Journal of Computer and System Sciences 78 (1), 142-150, 2012
Password security—No change in 35 years?
V Taneski, M Heričko, B Brumen
2014 37th International Convention on Information and Communication …, 2014
Two proposed identity-based three-party authenticated key agreement protocols from pairings
M Hölbl, T Welzer, B Brumen
computers & security 29 (2), 244-252, 2010
Outsourcing medical data analyses: can technology overcome legal, privacy, and confidentiality issues?
B Brumen, M Heričko, A Sevčnikar, J Završnik, M Hölbl
Journal of medical Internet research 15 (12), e2471, 2013
Medical diagnostic and data quality
T Welzer, B Brumen, I Golob, M Druovec
Proceedings of 15th IEEE Symposium on Computer-Based Medical Systems (CBMS …, 2002
The influence of competencies of managers on job satisfaction of employees in the hotel industry
M Gorenak, T Špindler, B Brumen
Organizacija 52 (2), 81-94, 2019
Rejecting the death of passwords: Advice for the future
L Bošnjak, B Brumen
Computer Science and Information Systems 16 (1), 313-332, 2019
Performance analysis of two open source intrusion detection systems
B Brumen, J Legvart
2016 39th International Convention on Information and Communication …, 2016
Improvement of the Peyravian–Jeffries’s user authentication protocol and password change protocol
M Hölbl, T Welzer, B Brumen
Computer Communications 31 (10), 1945-1951, 2008
Shoulder surfing: From an experimental study to a comparative framework
L Bošnjak, B Brumen
International Journal of Human-Computer Studies 130, 1-20, 2019
Systematic overview of password security problems
V Taneski, M Heričko, B Brumen
Acta Polytechnica Hungarica 16 (3), 143-165, 2019
The impact of details in the class diagram on software size estimation
A Živkovič, M Heričko, B Brumen, S Beloglavec, I Rozman
Informatica 16 (2), 295-312, 2005
Security analysis of game changer password system
B Brumen
International Journal of Human-Computer Studies 126, 44-52, 2019
Assessment of classification models with small amounts of data
B Brumen, MB Jurič, T Welzer, I Rozman, H Jaakkola, A Papadopoulos
Informatica 18 (3), 343-362, 2007
Performance assessment framework for distributed object architectures
MB Juricč, T Welzer, I Rozman, M Heričko, B Brumen, T Domajnko, ...
Advances in Databases and Information Systems: Third East European …, 1999
The system can't perform the operation now. Try again later.
Articles 1–20