Author of the publication

Authentication Re-visited: How Public Key Infrastructure Could Yet Prosper.

. Bled eConference, page 8. (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The strategic intent of on-line trading systems: a case study in national livestock marketing., and . J. Strateg. Inf. Syst., 2 (1): 57-76 (1993)Research Perspectives: Through Whose Eyes? The Critical Concept of Researcher Perspective., and . J. Assoc. Inf. Syst., 21 (2): 1 (2020)Evaluation Or Justification? The Application of Cost/benefit Analysis to Computer Matching Schemes., and . ECIS, page 104-119. Cork Publishing Ltd, (1997)Is Use of Optional Attributes and Associations in Conceptual Modeling Always Problematic? Theory and Empirical Tests., , , and . ICIS, Association for Information Systems, (2012)Web 2.0 as syndication. J. Theor. Appl. Electron. Commer. Res., 3 (2): 30--43 (2008)Notes for the workshop on freedom and privacy by design.. CFP, page 43-44. ACM, (2000)IS research ethics: defining ethical, barely ethical, and unethical behavior (panel)., , , and . ICIS, page 720-723. Association for Information Systems, (2000)Towards Responsible Data Analytics: A Process Approach., and . Bled eConference, page 36. University of Maribor Press / Association for Information Systems, (2018)On the relationship between aggregate merger activity and the stock market: some further empirical evidence, and . Economics Letters, 53 (3): 349--356 (December 1996)An eCommerce Perspective on Carbon Trading.. Bled eConference, page 23. (2009)