A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion M Turkanović, B Brumen, M Hölbl Ad Hoc Networks 20, 96-112, 2014 | 623 | 2014 |
Comparison of performance of Web services, WS-Security, RMI, and RMI–SSL MB Juric, I Rozman, B Brumen, M Colnaric, M Hericko Journal of Systems and Software 79 (5), 689-700, 2006 | 145 | 2006 |
WSDL and UDDI extensions for version support in web services MB Juric, A Sasa, B Brumen, I Rozman Journal of Systems and Software 82 (8), 1326-1343, 2009 | 99 | 2009 |
Brute-force and dictionary attack on hashed real-world passwords L Bošnjak, J Sreš, B Brumen 2018 41st international convention on information and communication …, 2018 | 80 | 2018 |
Perceived threat of COVID-19 and future travel avoidance: Results from an early convenient sample in Slovenia M Turnšek, B Brumen, M Rangus, M Gorenak, J Mekinc, TL Štuhec Academica Turistica-Tourism and Innovation Journal 13 (1), 2020 | 60 | 2020 |
An improved two-party identity-based authenticated key agreement protocol using pairings M Hölbl, T Welzer, B Brumen Journal of Computer and System Sciences 78 (1), 142-150, 2012 | 59 | 2012 |
Password security—No change in 35 years? V Taneski, M Heričko, B Brumen 2014 37th International Convention on Information and Communication …, 2014 | 51 | 2014 |
Two proposed identity-based three-party authenticated key agreement protocols from pairings M Hölbl, T Welzer, B Brumen computers & security 29 (2), 244-252, 2010 | 38 | 2010 |
Outsourcing medical data analyses: can technology overcome legal, privacy, and confidentiality issues? B Brumen, M Heričko, A Sevčnikar, J Završnik, M Hölbl Journal of medical Internet research 15 (12), e2471, 2013 | 34 | 2013 |
Medical diagnostic and data quality T Welzer, B Brumen, I Golob, M Druovec Proceedings of 15th IEEE Symposium on Computer-Based Medical Systems (CBMS …, 2002 | 27 | 2002 |
The influence of competencies of managers on job satisfaction of employees in the hotel industry M Gorenak, T Špindler, B Brumen Organizacija 52 (2), 81-94, 2019 | 26 | 2019 |
Rejecting the death of passwords: Advice for the future L Bošnjak, B Brumen Computer Science and Information Systems 16 (1), 313-332, 2019 | 23 | 2019 |
Performance analysis of two open source intrusion detection systems B Brumen, J Legvart 2016 39th International Convention on Information and Communication …, 2016 | 23 | 2016 |
Improvement of the Peyravian–Jeffries’s user authentication protocol and password change protocol M Hölbl, T Welzer, B Brumen Computer Communications 31 (10), 1945-1951, 2008 | 22 | 2008 |
Shoulder surfing: From an experimental study to a comparative framework L Bošnjak, B Brumen International Journal of Human-Computer Studies 130, 1-20, 2019 | 20 | 2019 |
Systematic overview of password security problems V Taneski, M Heričko, B Brumen Acta Polytechnica Hungarica 16 (3), 143-165, 2019 | 20 | 2019 |
The impact of details in the class diagram on software size estimation A Živkovič, M Heričko, B Brumen, S Beloglavec, I Rozman Informatica 16 (2), 295-312, 2005 | 20 | 2005 |
Security analysis of game changer password system B Brumen International Journal of Human-Computer Studies 126, 44-52, 2019 | 18 | 2019 |
Assessment of classification models with small amounts of data B Brumen, MB Jurič, T Welzer, I Rozman, H Jaakkola, A Papadopoulos Informatica 18 (3), 343-362, 2007 | 18 | 2007 |
Performance assessment framework for distributed object architectures MB Juricč, T Welzer, I Rozman, M Heričko, B Brumen, T Domajnko, ... Advances in Databases and Information Systems: Third East European …, 1999 | 18 | 1999 |