Author of the publication

Cadenus security considerations.

, , and . Communications and Multimedia Security, volume 228 of IFIP Conference Proceedings, page 267-278. Kluwer, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Struktura ponudbe e-izobraževanja v Sloveniji, , and . (2006)Analyses of User Rationality and System Learnability: Performing Task Variants in User Tests, , and . (2005)An Assessment of the Usability of Internet Based Education System in a Cross-cultural Environment: the Case of Interreg Crossborder Program in Central Europe, , and . Journal of the American Society for Information Science and Technology, (2005)Privacy provision in e-learning systems, , and . 1, page 1314-1319. (2004)Assessment of User Rationality and Adaptivity: A Case Study., and . CELDA, page 404-408. IADIS, (2004)Experience In Shaping The Virtual Lecturing Hall In An International Environment., and . WebNet, page 562-568. AACE, (1999)Cadenus security considerations., , and . Communications and Multimedia Security, volume 228 of IFIP Conference Proceedings, page 267-278. Kluwer, (2002)New method for determination complexity using in AD HOC cloud computing., and . MIPRO, page 188-191. IEEE, (2017)Computer networking for the European academic community: The EUREKA project cosine.. Comput. Chem., 14 (4): 299-303 (1990)Why That Picture? Discovering Password Properties in Recognition-Based Graphical Authentication., , and . Int. J. Hum. Comput. Interact., 32 (12): 975-988 (2016)