A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion M Turkanović, B Brumen, M Hölbl Ad Hoc Networks 20, 96-112, 2014 | 760 | 2014 |
Brute-force and dictionary attack on hashed real-world passwords L Bošnjak, J Sreš, B Brumen 2018 41st international convention on information and communication …, 2018 | 157 | 2018 |
Comparison of performance of Web services, WS-Security, RMI, and RMI–SSL MB Juric, I Rozman, B Brumen, M Colnaric, M Hericko Journal of Systems and Software 79 (5), 689-700, 2006 | 151 | 2006 |
WSDL and UDDI extensions for version support in web services MB Juric, A Sasa, B Brumen, I Rozman Journal of Systems and Software 82 (8), 1326-1343, 2009 | 102 | 2009 |
Perceived threat of COVID-19 and future travel avoidance: Results from an early convenient sample in Slovenia M Turnšek, B Brumen, M Rangus, M Gorenak, J Mekinc, TL Štuhec Academica Turistica-Tourism and Innovation Journal 13 (1), 2020 | 95 | 2020 |
Password security—No change in 35 years? V Taneski, M Heričko, B Brumen 2014 37th International Convention on Information and Communication …, 2014 | 65 | 2014 |
An improved two-party identity-based authenticated key agreement protocol using pairings M Hölbl, T Welzer, B Brumen Journal of Computer and System Sciences 78 (1), 142-150, 2012 | 63 | 2012 |
Shoulder surfing experiments: A systematic literature review L Bošnjak, B Brumen Computers & Security 99, 102023, 2020 | 45 | 2020 |
The influence of competencies of managers on job satisfaction of employees in the hotel industry M Gorenak, T Špindler, B Brumen Organizacija 52 (2), 81-94, 2019 | 41 | 2019 |
Two proposed identity-based three-party authenticated key agreement protocols from pairings M Hölbl, T Welzer, B Brumen computers & security 29 (2), 244-252, 2010 | 41 | 2010 |
Rejecting the death of passwords: Advice for the future L Bošnjak, B Brumen Computer Science and Information Systems 16 (1), 313-332, 2019 | 39 | 2019 |
Outsourcing medical data analyses: can technology overcome legal, privacy, and confidentiality issues? B Brumen, M Heričko, A Sevčnikar, J Završnik, M Hölbl Journal of medical Internet research 15 (12), e2471, 2013 | 38 | 2013 |
The influence of organizational values on job satisfaction of employees M Gorenak, JR Edelheim, B Brumen Human Systems Management 39 (3), 329-343, 2020 | 35 | 2020 |
Shoulder surfing: From an experimental study to a comparative framework L Bošnjak, B Brumen International Journal of Human-Computer Studies 130, 1-20, 2019 | 34 | 2019 |
Systematic overview of password security problems V Taneski, M Heričko, B Brumen Acta Polytechnica Hungarica 16 (3), 143-165, 2019 | 33 | 2019 |
Medical diagnostic and data quality T Welzer, B Brumen, I Golob, M Druovec Proceedings of 15th IEEE Symposium on Computer-Based Medical Systems (CBMS …, 2002 | 27 | 2002 |
Performance analysis of two open source intrusion detection systems B Brumen, J Legvart 2016 39th International Convention on Information and Communication …, 2016 | 26 | 2016 |
Sustainable tourism development in rural areas: The role of stakeholders M Rangus, B Brumen, JP Topler Academica Turistica-Tourism and Innovation Journal 10 (2), 2017 | 25 | 2017 |
Improvement of the Peyravian–Jeffries’s user authentication protocol and password change protocol M Hölbl, T Welzer, B Brumen Computer Communications 31 (10), 1945-1951, 2008 | 23 | 2008 |
The impact of details in the class diagram on software size estimation A Živkovič, M Heričko, B Brumen, S Beloglavec, I Rozman Informatica 16 (2), 295-312, 2005 | 23 | 2005 |