Marko Hölbl
Orcid: 0000-0002-9414-3189
According to our database1,
Marko Hölbl
authored at least 45 papers
between 2007 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2023
Proceedings of the Information Modelling and Knowledge Bases XXXV, 2023
2022
J. Cybersecur. Priv., February, 2022
2019
A Model of Perception of Privacy, Trust, and Self-Disclosure on Online Social Networks.
Entropy, 2019
A robust and efficient mutual authentication and key agreement scheme with untraceability for WBANs.
Comput. Networks, 2019
Analysis and improvement of a secure key management protocol for e-health applications.
Comput. Electr. Eng., 2019
Proceedings of the Eighth Workshop on Software Quality Analysis, 2019
2018
Introducing Public-Key infrastructure for SiebogJS JavaScript-based Agent Middleware.
Proceedings of the 8th International Conference on Web Intelligence, Mining and Semantics, 2018
Proceedings of the 41st International Convention on Information and Communication Technology, 2018
Proceedings of the 17th International Conference on Information Technology Based Higher Education and Training, 2018
2016
An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment.
Ad Hoc Networks, 2016
2015
IACR Cryptol. ePrint Arch., 2015
Comput. Hum. Behav., 2015
Proceedings of the 4th Workshop on Software Quality Analysis, 2015
Proceedings of the 4th Workshop on Software Quality Analysis, 2015
Introducing cultural issues and cultural awareness in conceptual modelling education.
Proceedings of the Information Modelling and Knowledge Bases XXVII, 2015
Proceedings of the Information Modelling and Knowledge Bases XXVII, 2015
2014
Notes on "A Temporal-Credential-Based Mutual Authentication and Key Agreement Scheme for Wireless Sensor Networks".
Wirel. Pers. Commun., 2014
The (in)adequacy of applicative use of quantum cryptography in wireless sensor networks.
Quantum Inf. Process., 2014
A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion.
Ad Hoc Networks, 2014
Proceedings of the 2014 Information Technology Based Higher Education and Training, 2014
Proceedings of the Information Modelling and Knowledge Bases XXVI, 2014
Proceedings of the 2014 IEEE Global Engineering Education Conference, 2014
2013
Informatica (Slovenia), 2013
2012
An improved two-party identity-based authenticated key agreement protocol using pairings.
J. Comput. Syst. Sci., 2012
Proceedings of the Information Modelling and Knowledge Bases XXIV, 2012
2011
Int. J. Adv. Corp. Learn., 2011
2010
Attacks and Improvement of an Efficient Remote Mutual Authentication and Key Agreement Scheme.
Cryptologia, 2010
Two proposed identity-based three-party authenticated key agreement protocols from pairings.
Comput. Secur., 2010
Need for the Intercultural Awareness in Erasmus Mobility - Administrative Point of View.
Proceedings of the Key Competencies in the Knowledge Society, 2010
2009
Comparative Study of Tripartite Identity-Based Authenticated Key Agreement Protocols.
Informatica (Slovenia), 2009
Comput. Stand. Interfaces, 2009
Proceedings of the Medical Informatics in a United and Healthy Europe - Proceedings of MIE 2009, The XXIInd International Congress of the European Federation for Medical Informatics, Sarajevo, Bosnia and Herzegovina, August 30, 2009
Proceedings of the Information Systems: Modeling, 2009
Proceedings of the Information Modelling and Knowledge Bases XXI, 2009
An Improved Authentication Protocol Based on One-Way Hash Functions and Diffie-Hellman Key Exchange.
Proceedings of the The Forth International Conference on Availability, 2009
2008
Improvement of the Peyravian-Jeffries's user authentication protocol and password change protocol.
Comput. Commun., 2008
Proceedings of the Information Systems and e-Business Technologies, 2008
Cryptanalysis and Improvement of an "Improved Remote Authentication Scheme with Smart Card".
Proceedings of the The Third International Conference on Availability, 2008
2007
Proceedings of the Research in Cryptology, Second Western European Workshop, 2007
Teaching of Information Security in the "Health Care and Nursing" Postgraduate program.
Proceedings of the New Approaches for Security, 2007