Author of the publication

Implementation and Evaluation of Integrity Protection Facilities for Active Grids.

, , , and . International Conference on Computational Science, volume 3038 of Lecture Notes in Computer Science, page 179-186. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Computer networking for the European academic community: The EUREKA project cosine.. Comput. Chem., 14 (4): 299-303 (1990)Why That Picture? Discovering Password Properties in Recognition-Based Graphical Authentication., , and . Int. J. Hum. Comput. Interact., 32 (12): 975-988 (2016)Cadenus security considerations., , and . Communications and Multimedia Security, volume 228 of IFIP Conference Proceedings, page 267-278. Kluwer, (2002)Experience In Shaping The Virtual Lecturing Hall In An International Environment., and . WebNet, page 562-568. AACE, (1999)Analyses of User Rationality and System Learnability: Performing Task Variants in User Tests, , and . (2005)An Assessment of the Usability of Internet Based Education System in a Cross-cultural Environment: the Case of Interreg Crossborder Program in Central Europe, , and . Journal of the American Society for Information Science and Technology, (2005)Privacy provision in e-learning systems, , and . 1, page 1314-1319. (2004)Assessment of User Rationality and Adaptivity: A Case Study., and . CELDA, page 404-408. IADIS, (2004)Struktura ponudbe e-izobraževanja v Sloveniji, , and . (2006)New method for determination complexity using in AD HOC cloud computing., and . MIPRO, page 188-191. IEEE, (2017)