This page has only limited features, please log in for full access.
Online Social Networks are used widely, raising new issues in terms of privacy, trust, and self-disclosure. For a better understanding of these issues for Facebook users, a model was built that includes privacy value, privacy risk, trust, privacy control, privacy concerns, and self-disclosure. A total of 602 respondents participated in an online survey, and structural equation modeling was used to evaluate the model. The findings indicate significant relationships between the constructs in this study. The model from our study contributes new knowledge to privacy issues, trust and self-disclosure on Online Social Networks for other researchers or developers of online social networks.
Lili Nemec Zlatolas; Tatjana Welzer; Marko Hölbl; Marjan Heričko; Aida Kamišalić. A Model of Perception of Privacy, Trust, and Self-Disclosure on Online Social Networks. Entropy 2019, 21, 772 .
AMA StyleLili Nemec Zlatolas, Tatjana Welzer, Marko Hölbl, Marjan Heričko, Aida Kamišalić. A Model of Perception of Privacy, Trust, and Self-Disclosure on Online Social Networks. Entropy. 2019; 21 (8):772.
Chicago/Turabian StyleLili Nemec Zlatolas; Tatjana Welzer; Marko Hölbl; Marjan Heričko; Aida Kamišalić. 2019. "A Model of Perception of Privacy, Trust, and Self-Disclosure on Online Social Networks." Entropy 21, no. 8: 772.
A Wireless Body Area Network is a network of sensors placed on a body, used primarily in healthcare to monitor the user's physical condition. This technology has significant potential for wide application in the future of healthcare. Hardware constraints, energy efficiency, and reliability requirements make building a confidential and mutually authenticating service for a WBAN challenging. It is possible for an adversary to gather information about the user's medical conditions if they are able to distinguish the source of the data from other data sources. It is, therefore, important, in addition to confidentiality and mutual authentication, to also provide anonymity and untraceability of the sensor nodes sending the personal (i.e., medical) data. In this paper, we will analyze an existing mutual authentication scheme designed for two-hop WBANs with anonymous and untraceable key establishment. We will present some weaknesses, specifically in the untraceability provision. This paper proposes a new authentication and key agreement scheme, with anonymity and untraceability. By comparison, the new scheme is shown to be efficient, and its security has been tested using the informal analysis tool Scyther, AVISPA and proven formally using BAN logic.
Marko Kompara; Sk Hafizul Islam; Marko Hölbl. A robust and efficient mutual authentication and key agreement scheme with untraceability for WBANs. Computer Networks 2018, 148, 196 -213.
AMA StyleMarko Kompara, Sk Hafizul Islam, Marko Hölbl. A robust and efficient mutual authentication and key agreement scheme with untraceability for WBANs. Computer Networks. 2018; 148 ():196-213.
Chicago/Turabian StyleMarko Kompara; Sk Hafizul Islam; Marko Hölbl. 2018. "A robust and efficient mutual authentication and key agreement scheme with untraceability for WBANs." Computer Networks 148, no. : 196-213.
A Body Sensor Network is a wireless network of wearable sensors, used primarily in healthcare to monitor the condition of the user. Such networks have high security and reliability requirements, while the devices collecting the data have very limited energy reserves and severe hardware constraints. Constructing security schemes for such networks can, therefore, be very challenging. In this paper, we analyse an existing Key Agreement Scheme. In our review, we discover some flaws in the security of the scheme. To improve the security and prevent malicious entities from gaining access or depleting the limited resources available, we design a new Key Agreement Scheme that is based on the previous scheme. The new scheme achieves a higher security level while maintaining comparable energy consumption.
Marko Kompara; Saru Kumari; Marko Hölbl. Analysis and improvement of a secure key management protocol for e-health applications. Computers & Electrical Engineering 2018, 73, 97 -113.
AMA StyleMarko Kompara, Saru Kumari, Marko Hölbl. Analysis and improvement of a secure key management protocol for e-health applications. Computers & Electrical Engineering. 2018; 73 ():97-113.
Chicago/Turabian StyleMarko Kompara; Saru Kumari; Marko Hölbl. 2018. "Analysis and improvement of a secure key management protocol for e-health applications." Computers & Electrical Engineering 73, no. : 97-113.
Blockchain technology enables a decentralized and distributed environment with no need for a central authority. Transactions are simultaneously secure and trustworthy due to the use of cryptographic principles. In recent years, blockchain technology has become very trendy and penetrated different domains, mostly due to the popularity of cryptocurrencies. One field where blockchain technology has tremendous potential is healthcare, due to the need for a more patient-centric approach to healthcare systems and to connect disparate systems and increase the accuracy of electronic healthcare records (EHRs). In this systematic review, an analysis of state-of-the-art blockchain research in the field of healthcare is conducted. The aim is to reveal the potential applications of the technology and to highlight the challenges and possible directions of blockchain research in healthcare. First, background information is discussed, followed by a description of the exact methodology used in this paper. Next, an analysis of the results is given, which includes a bibliometric overview, an analysis of gathered data and its properties, and the results of a literature quality assessment. Lastly, there is a discussion of the results from the analysis. The findings indicate that blockchain technology research in healthcare is increasing and it is mostly used for data sharing, managing health records and access control. Other scenarios are very rare. Most research is aimed at presenting novel structural designs in the form of frameworks, architectures or models. Findings also show that technical details about the used blockchain elements are not given in most of the analyzed publications and that most research does not present any prototype implementation or implementation details. Often even with a prototype implementation, no details about blockchain elements are given.
Marko Hölbl; Marko Kompara; Aida Kamišalić; Lili Nemec Zlatolas. A Systematic Review of the Use of Blockchain in Healthcare. Symmetry 2018, 10, 470 .
AMA StyleMarko Hölbl, Marko Kompara, Aida Kamišalić, Lili Nemec Zlatolas. A Systematic Review of the Use of Blockchain in Healthcare. Symmetry. 2018; 10 (10):470.
Chicago/Turabian StyleMarko Hölbl; Marko Kompara; Aida Kamišalić; Lili Nemec Zlatolas. 2018. "A Systematic Review of the Use of Blockchain in Healthcare." Symmetry 10, no. 10: 470.
Blockchain technology enables a decentralized and distributed environment with no need for a central authority. Transactions are simultaneously secure and trustworthy due to the use of cryptographic principles. In recent years, blockchain technology has become very trendy and penetrated different domains, mostly due to the popularity of cryptocurrencies. One field where blockchain technology has tremendous potential is healthcare, due to the need for a more patient-centric approach to healthcare systems and to connect disparate systems and increase the accuracy of electronic healthcare records (EHRs). In this systematic review, an analysis of state-of-the-art blockchain research in the field of healthcare is conducted. The aim is to reveal the potential applications of the technology and to highlight the challenges and possible directions of blockchain research in healthcare. First, background information is discussed, followed by a description of the exact methodology used in this paper. Next, an analysis of the results is given, which includes a bibliometric overview, an analysis of gathered data and its properties, and the results of a literature quality assessment. Lastly, there is a discussion of the results from the analysis. The findings indicate that blockchain technology research in healthcare is increasing and it is mostly used for data sharing, managing health records and access control. Other scenarios are very rare. Most research is aimed at presenting novel structural designs in the form of frameworks, architectures or models. Findings also show that technical details about the used blockchain elements are not given in most of the analyzed publications and that most research does not present any prototype implementation or implementation details. Often even with a prototype implementation, no details about blockchain elements are given.
Marko Hölbl; Marko Kompara; Aida Kamišalić; Lili Nemec Zlatolas. A Systematic Review of the Use of Blockchain in Healthcare. 2018, 1 .
AMA StyleMarko Hölbl, Marko Kompara, Aida Kamišalić, Lili Nemec Zlatolas. A Systematic Review of the Use of Blockchain in Healthcare. . 2018; ():1.
Chicago/Turabian StyleMarko Hölbl; Marko Kompara; Aida Kamišalić; Lili Nemec Zlatolas. 2018. "A Systematic Review of the Use of Blockchain in Healthcare." , no. : 1.
With the advances in microelectronics, embedded computing, and wireless communications, the interest in Body Sensor Networks has risen sharply and has enabled the development and implementation of such networks. A Body Sensor Network is constructed from sensor nodes distributed in and on the user's body. The nodes form a wireless network that collects physiological data and forwards it on. This sort of network has wide application prospects in the future of healthcare. The collected data is highly private and must, therefore, be protected adequately. The security mechanisms usually deployed depend heavily on the key agreement scheme. Because of the reliability requirements, energy efficiency, and hardware constraints, building a key agreement scheme for a Body Sensor Network can be quite a challenge. This paper presents a state-of-the-art overview of security in Body Sensor Networks, focusing on proposed key agreement schemes, ways they are built in, and the methods used to evaluate their security and performance. Results show that the community is very much split between the traditional key agreement schemes and schemes that take advantage of physiological or other signals to exchange a key. Security analysis is rarely performed with formal methods; instead, descriptive analysis is commonplace. There are no standards or guidelines on measuring a scheme`s efficiency. The authors therefore used different methods and, consequently, schemes can be difficult to compare.
Marko Kompara; Marko Hölbl. Survey on security in intra-body area network communication. Ad Hoc Networks 2018, 70, 23 -43.
AMA StyleMarko Kompara, Marko Hölbl. Survey on security in intra-body area network communication. Ad Hoc Networks. 2018; 70 ():23-43.
Chicago/Turabian StyleMarko Kompara; Marko Hölbl. 2018. "Survey on security in intra-body area network communication." Ad Hoc Networks 70, no. : 23-43.
Blockchain technology enables the creation of a decentralized environment where transactions and data are not under the control of any third party organization. Any transaction ever completed is recorded in a public ledger in a verifiable and permanent way. Based on blockchain technology, we propose a global higher education credit platform, named EduCTX. This platform is based on the concept of the European Credit Transfer and Accumulation System (ECTS). It constitutes a globally trusted, decentralized higher education credit and grading system that can offer a globally unified viewpoint for students and higher education institutions (HEIs), as well as for other potential stakeholders such as companies, institutions and organizations. As a proof of concept, we present a prototype implementation of the environment, based on the open-source Ark Blockchain Platform. Based on a globally distributed peer-topeer network, EduCTX will process, manage and control ECTX tokens, which represent credits that students gain for completed courses such as ECTS. HEIs are the peers of the blockchain network. The platform is a first step towards a more transparent and technologically advanced form of higher education systems. The EduCTX platform represents the basis of the EduCTX initiative which anticipates that various HEIs would join forces in order to create a globally efficient, simplified and ubiquitous environment in order to avoid language and administrative barriers. Therefore we invite and encourage HEIs to join the EduCTX initiative and the EduCTX blockchain network.
Muhamed Turkanovic; Marko Holbl; Kristjan Kosic; Marjan Hericko; Aida Kamisalic. EduCTX: A Blockchain-Based Higher Education Credit Platform. IEEE Access 2018, 6, 5112 -5127.
AMA StyleMuhamed Turkanovic, Marko Holbl, Kristjan Kosic, Marjan Hericko, Aida Kamisalic. EduCTX: A Blockchain-Based Higher Education Credit Platform. IEEE Access. 2018; 6 (99):5112-5127.
Chicago/Turabian StyleMuhamed Turkanovic; Marko Holbl; Kristjan Kosic; Marjan Hericko; Aida Kamisalic. 2018. "EduCTX: A Blockchain-Based Higher Education Credit Platform." IEEE Access 6, no. 99: 5112-5127.
The development of smart phones and other smart devices has led to the development of mobile applications, which are in use frequently by the users. It is also anticipated that the number of mobile applications will grow rapidly in the next years. This topic has, therefore, been researched highly in the past years. Mobile applications gather user data and that is why privacy and security in mobile applications is a very important research topic. In this chapter we give an overview of the current research on privacy and security issues of mobile applications.
Lili Nemec Zlatolas; Tatjana Welzer-Druzovec; Marjan Heričko; Marko Hölbl; In Lee; Jean-Éric Pelet. Models of Privacy and Security Issues on Mobile Applications. Advances in E-Business Research 2017, 84 -105.
AMA StyleLili Nemec Zlatolas, Tatjana Welzer-Druzovec, Marjan Heričko, Marko Hölbl, In Lee, Jean-Éric Pelet. Models of Privacy and Security Issues on Mobile Applications. Advances in E-Business Research. 2017; ():84-105.
Chicago/Turabian StyleLili Nemec Zlatolas; Tatjana Welzer-Druzovec; Marjan Heričko; Marko Hölbl; In Lee; Jean-Éric Pelet. 2017. "Models of Privacy and Security Issues on Mobile Applications." Advances in E-Business Research , no. : 84-105.
Besides the opportunities offered by the all-embracing Internet of Things (IoT) technology, it also poses a tremendous threat to the privacy of the carriers of these devices. In this work, we build upon the idea of an RFID-based IoT realized by means of standardized and well-established Internet protocols. In particular, we demonstrate how the Internet Protocol Security protocol suite (IPsec) can be applied in a privacy-aware manner. Therefore, we introduce a privacy-aware mutual authentication protocol compatible with restrictions imposed by the IPsec standard and analyze its privacy and security properties. With this work, we show that privacy in the IoT can be achieved without proprietary protocols and on the basis of existing Internet standards.
Hannes Gross; Marko Hölbl; Daniel Slamanig; Raphael Spreitzer. Privacy-Aware Authentication in the Internet of Things. Transactions on Petri Nets and Other Models of Concurrency XV 2015, 32 -39.
AMA StyleHannes Gross, Marko Hölbl, Daniel Slamanig, Raphael Spreitzer. Privacy-Aware Authentication in the Internet of Things. Transactions on Petri Nets and Other Models of Concurrency XV. 2015; ():32-39.
Chicago/Turabian StyleHannes Gross; Marko Hölbl; Daniel Slamanig; Raphael Spreitzer. 2015. "Privacy-Aware Authentication in the Internet of Things." Transactions on Petri Nets and Other Models of Concurrency XV , no. : 32-39.
Lili Nemec Zlatolas; Tatjana Welzer; Marjan Heričko; Marko Hölbl. Privacy antecedents for SNS self-disclosure: The case of Facebook. Computers in Human Behavior 2015, 45, 158 -167.
AMA StyleLili Nemec Zlatolas, Tatjana Welzer, Marjan Heričko, Marko Hölbl. Privacy antecedents for SNS self-disclosure: The case of Facebook. Computers in Human Behavior. 2015; 45 ():158-167.
Chicago/Turabian StyleLili Nemec Zlatolas; Tatjana Welzer; Marjan Heričko; Marko Hölbl. 2015. "Privacy antecedents for SNS self-disclosure: The case of Facebook." Computers in Human Behavior 45, no. : 158-167.
Muhamed Turkanović; Boštjan Brumen; Marko Hölbl. A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion. Ad Hoc Networks 2014, 20, 96 -112.
AMA StyleMuhamed Turkanović, Boštjan Brumen, Marko Hölbl. A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion. Ad Hoc Networks. 2014; 20 ():96-112.
Chicago/Turabian StyleMuhamed Turkanović; Boštjan Brumen; Marko Hölbl. 2014. "A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion." Ad Hoc Networks 20, no. : 96-112.
Recently quantum computation and cryptography principles are exploited in the design of security systems for wireless sensor networks (WSNs), which are consequently named as quantum WSN. Quantum cryptography is presumably secure against any eavesdropper and thus labeled as providing unconditional security. This paper tries to analyze the aspect of the applicative use of quantum principles in WSN. The outcome of the analysis elaborates a summary about the inadequacy of applicative use of quantum cryptography in WSN and presents an overview of all possible applicative challenges and problems while designing quantum-based security systems for WSN. Since WSNs are highly complex frameworks, with many restrictions and constraints, every security system has to be fully compatible and worthwhile. The aim of the paper was to contribute a verdict about this topic, backed up by equitable facts.
Muhamed Turkanović; Marko Hölbl. The (in)adequacy of applicative use of quantum cryptography in wireless sensor networks. Quantum Information Processing 2014, 13, 2255 -2275.
AMA StyleMuhamed Turkanović, Marko Hölbl. The (in)adequacy of applicative use of quantum cryptography in wireless sensor networks. Quantum Information Processing. 2014; 13 (10):2255-2275.
Chicago/Turabian StyleMuhamed Turkanović; Marko Hölbl. 2014. "The (in)adequacy of applicative use of quantum cryptography in wireless sensor networks." Quantum Information Processing 13, no. 10: 2255-2275.
Boštjan Brumen; Ivan Rozman; Marjan Heričko; Aleš Černezel; Marko Hölbl. Best-Fit Learning Curve Model for the C4.5 Algorithm. Informatica 2014, 25, 385 -399.
AMA StyleBoštjan Brumen, Ivan Rozman, Marjan Heričko, Aleš Černezel, Marko Hölbl. Best-Fit Learning Curve Model for the C4.5 Algorithm. Informatica. 2014; 25 (3):385-399.
Chicago/Turabian StyleBoštjan Brumen; Ivan Rozman; Marjan Heričko; Aleš Černezel; Marko Hölbl. 2014. "Best-Fit Learning Curve Model for the C4.5 Algorithm." Informatica 25, no. 3: 385-399.
Background: Medical data are gold mines for deriving the knowledge that could change the course of a single patient’s life or even the health of the entire population. A data analyst needs to have full access to relevant data, but full access may be denied by privacy and confidentiality of medical data legal regulations, especially when the data analyst is not affiliated with the data owner. Objective: Our first objective was to analyze the privacy and confidentiality issues and the associated regulations pertaining to medical data, and to identify technologies to properly address these issues. Our second objective was to develop a procedure to protect medical data in such a way that the outsourced analyst would be capable of doing analyses on protected data and the results would be comparable, if not the same, as if they had been done on the original data. Specifically, our hypothesis was there would not be a difference between the outsourced decision trees built on encrypted data and the ones built on original data. Methods: Using formal definitions, we developed an algorithm to protect medical data for outsourced analyses. The algorithm was applied to publicly available datasets (N=30) from the medical and life sciences fields. The analyses were performed on the original and the protected datasets and the results of the analyses were compared. Bootstrapped paired t tests for 2 dependent samples were used to test whether the mean differences in size, number of leaves, and the accuracy of the original and the encrypted decision trees were significantly different. Results: The decision trees built on encrypted data were virtually the same as those built on original data. Out of 30 datasets, 100% of the trees had identical accuracy. The size of a tree and the number of leaves was different only once (1/30, 3%, P =.19). Conclusions: The proposed algorithm encrypts a file with plain text medical data into an encrypted file with the data protected in such a way that external data analyses are still possible. The results show that the results of analyses on original and on protected data are identical or comparably similar. The approach addresses the privacy and confidentiality issues that arise with medical data and is adherent to strict legal rules in the United States and Europe regarding the processing of the medical data. [J Med Internet Res 2013;15(12):e283]
Bostjan Brumen; Marjan Heričko; Andrej Sevčnikar; Jernej Završnik; Marko Hölbl. Outsourcing Medical Data Analyses: Can Technology Overcome Legal, Privacy, and Confidentiality Issues? Journal of Medical Internet Research 2013, 15, e283 .
AMA StyleBostjan Brumen, Marjan Heričko, Andrej Sevčnikar, Jernej Završnik, Marko Hölbl. Outsourcing Medical Data Analyses: Can Technology Overcome Legal, Privacy, and Confidentiality Issues? Journal of Medical Internet Research. 2013; 15 (12):e283.
Chicago/Turabian StyleBostjan Brumen; Marjan Heričko; Andrej Sevčnikar; Jernej Završnik; Marko Hölbl. 2013. "Outsourcing Medical Data Analyses: Can Technology Overcome Legal, Privacy, and Confidentiality Issues?" Journal of Medical Internet Research 15, no. 12: e283.
Xue et al. recently proposed an innovative mutual authentication and key agreement scheme for wireless sensor networks based on temporal credential using smart cards. However, in this paper we demonstrate that their scheme is vulnerable to password guessing attacks, node capture attacks and denial-of-service attacks. Furthermore we show that their scheme has some inconsistencies which make it less secure and more computationally costly than originally presented.
Muhamed Turkanović; Marko Hölbl. Notes on “A Temporal-Credential-Based Mutual Authentication and Key Agreement Scheme for Wireless Sensor Networks”. Wireless Personal Communications 2013, 77, 907 -922.
AMA StyleMuhamed Turkanović, Marko Hölbl. Notes on “A Temporal-Credential-Based Mutual Authentication and Key Agreement Scheme for Wireless Sensor Networks”. Wireless Personal Communications. 2013; 77 (2):907-922.
Chicago/Turabian StyleMuhamed Turkanović; Marko Hölbl. 2013. "Notes on “A Temporal-Credential-Based Mutual Authentication and Key Agreement Scheme for Wireless Sensor Networks”." Wireless Personal Communications 77, no. 2: 907-922.
Background: In a recent paper, Pietro Cipresso et al proposed the PsychoPass method, a simple way to create strong passwords that are easy to remember. However, the method has some security issues that need to be addressed. Objective: To perform a security analysis on the PsychoPass method and outline the limitations of and possible improvements to the method. Methods: We used the brute force analysis and dictionary attack analysis of the PsychoPass method to outline its weaknesses. Results: The first issue with the Psychopass method is that it requires the password reproduction on the same keyboard layout as was used to generate the password. The second issue is a security weakness: although the produced password is 24 characters long, the password is still weak. We elaborate on the weakness and propose a solution that produces strong passwords. The proposed version first requires the use of the SHIFT and ALT-GR keys in combination with other keys, and second, the keys need to be 1-2 distances apart. Conclusions: The proposed improved PsychoPass method yields passwords that can be broken only in hundreds of years based on current computing powers. The proposed PsychoPass method requires 10 keys, as opposed to 20 keys in the original method, for comparable password strength. [J Med Internet Res 2013;15(8):e161]
Bostjan Brumen; Marjan Heričko; Ivan Rozman; Marko Hölbl; Pietro Cipresso; Robin Kok. Security Analysis and Improvements to the PsychoPass Method. Journal of Medical Internet Research 2013, 15, e161 .
AMA StyleBostjan Brumen, Marjan Heričko, Ivan Rozman, Marko Hölbl, Pietro Cipresso, Robin Kok. Security Analysis and Improvements to the PsychoPass Method. Journal of Medical Internet Research. 2013; 15 (8):e161.
Chicago/Turabian StyleBostjan Brumen; Marjan Heričko; Ivan Rozman; Marko Hölbl; Pietro Cipresso; Robin Kok. 2013. "Security Analysis and Improvements to the PsychoPass Method." Journal of Medical Internet Research 15, no. 8: e161.
Two-party authenticated key agreement protocols using pairings have gained much attention in the cryptographic community. Several protocols of this type where proposed in the past of which many were found to be flawed. This resulted in attacks or the inability to conform to security attributes. In this paper, we propose an efficient identity-based authenticated key agreement protocol employing pairings which employs a variant of a signature scheme and conforms to security attributes. Additionally, existing competitive and the proposed protocol are compared regarding efficiency and security. The criteria for efficiency are defined in this paper, whereas the criteria for security are defined by the fulfilment of security attributes from literature
Marko Hölbl; Tatjana Welzer; Boštjan Brumen. An improved two-party identity-based authenticated key agreement protocol using pairings. Journal of Computer and System Sciences 2012, 78, 142 -150.
AMA StyleMarko Hölbl, Tatjana Welzer, Boštjan Brumen. An improved two-party identity-based authenticated key agreement protocol using pairings. Journal of Computer and System Sciences. 2012; 78 (1):142-150.
Chicago/Turabian StyleMarko Hölbl; Tatjana Welzer; Boštjan Brumen. 2012. "An improved two-party identity-based authenticated key agreement protocol using pairings." Journal of Computer and System Sciences 78, no. 1: 142-150.
Publisher: Vilnius University Institute of Data Science and Digital Technologies, Journal: Informatica, Title: Learning Process Termination Criteria, Authors: Boštjan Brumen, Marko Hölbl, Katja Harej Pulko, Tatjana Welzer, Marjan Heričko, Matjaž B. Jurič, Hannu Jaakkola , In a supervised learning, the relationship between the available data and the performance (what is learnt) is not well understood. How much data to use, or when to stop the learning process, are the key questions. In the paper, we present an approach for an early assessment of the extracted knowledge (classification models) in the terms of performance (accuracy). The key questions are answered by detecting the point of convergence, i.e., where the classification model's performance does not improve any more even when adding more data items to the learning set. For the learning process termination criteria we developed a set of equations for detection of the convergence that follow the basic principles of the learning curve. The developed solution was evaluated on real datasets. The results of the experiment prove that the solution is well-designed: the learning process stopping criteria are not subjected to local variance and the convergence is detected where it actually has occurred.
Boštjan Brumen; Marko Hölbl; Katja Harej Pulko; Tatjana Welzer; Marjan Heričko; Matjaž B. Jurič; Hannu Jaakkola. Learning Process Termination Criteria. Informatica 2012, 23, 521 -536.
AMA StyleBoštjan Brumen, Marko Hölbl, Katja Harej Pulko, Tatjana Welzer, Marjan Heričko, Matjaž B. Jurič, Hannu Jaakkola. Learning Process Termination Criteria. Informatica. 2012; 23 (4):521-536.
Chicago/Turabian StyleBoštjan Brumen; Marko Hölbl; Katja Harej Pulko; Tatjana Welzer; Marjan Heričko; Matjaž B. Jurič; Hannu Jaakkola. 2012. "Learning Process Termination Criteria." Informatica 23, no. 4: 521-536.
Tatjana Welzer; Marko Hölbl; Marjan Družovec; Boštjan Brumen. Cultural awareness in social media. Proceedings of the 2011 International Workshop on Symbolic-Numeric Computation - SNC '11 2011, 3 .
AMA StyleTatjana Welzer, Marko Hölbl, Marjan Družovec, Boštjan Brumen. Cultural awareness in social media. Proceedings of the 2011 International Workshop on Symbolic-Numeric Computation - SNC '11. 2011; ():3.
Chicago/Turabian StyleTatjana Welzer; Marko Hölbl; Marjan Družovec; Boštjan Brumen. 2011. "Cultural awareness in social media." Proceedings of the 2011 International Workshop on Symbolic-Numeric Computation - SNC '11 , no. : 3.
The use of pairings has been shown promising for many two-party and three-party identity-based authenticated key agreement protocols. In recent years, several identity-based authenticated key agreement protocols have been proposed and most of them broken. In this paper, we propose two three-party identity-based authenticated key agreement protocols applying bilinear pairings. We show that the proposed protocols are secure (i.e. conform to defined security attributes) while being efficient.
Marko Hölbl; Tatjana Welzer; Bostjan Brumen. Two proposed identity-based three-party authenticated key agreement protocols from pairings. Computers & Security 2010, 29, 244 -252.
AMA StyleMarko Hölbl, Tatjana Welzer, Bostjan Brumen. Two proposed identity-based three-party authenticated key agreement protocols from pairings. Computers & Security. 2010; 29 (2):244-252.
Chicago/Turabian StyleMarko Hölbl; Tatjana Welzer; Bostjan Brumen. 2010. "Two proposed identity-based three-party authenticated key agreement protocols from pairings." Computers & Security 29, no. 2: 244-252.