Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cadenus security considerations., , and . Communications and Multimedia Security, volume 228 of IFIP Conference Proceedings, page 267-278. Kluwer, (2002)Experience In Shaping The Virtual Lecturing Hall In An International Environment., and . WebNet, page 562-568. AACE, (1999)Analyses of User Rationality and System Learnability: Performing Task Variants in User Tests, , and . (2005)An Assessment of the Usability of Internet Based Education System in a Cross-cultural Environment: the Case of Interreg Crossborder Program in Central Europe, , and . Journal of the American Society for Information Science and Technology, (2005)Privacy provision in e-learning systems, , and . 1, page 1314-1319. (2004)Assessment of User Rationality and Adaptivity: A Case Study., and . CELDA, page 404-408. IADIS, (2004)Struktura ponudbe e-izobraževanja v Sloveniji, , and . (2006)Comparison of three different approaches to the property prediction problem., , and . Journal of Chemical Information and Computer Sciences, 34 (2): 391-394 (1994)Standard specification extensions for provision of language and character enabled server., , and . Comput. Commun., 20 (11): 927-936 (1997)User awareness and tolerance of privacy abuse on mobile Internet: An exploratory study., , and . Telematics Informatics, 33 (1): 109-128 (2016)