Marko Hölbl

Orcid: 0000-0002-9414-3189

According to our database1, Marko Hölbl authored at least 45 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Browser Fingerprinting: Overview and Open Challenges.
Proceedings of the Information Modelling and Knowledge Bases XXXV, 2023

2022
Security Perception of IoT Devices in Smart Homes.
J. Cybersecur. Priv., February, 2022

2019
A Model of Perception of Privacy, Trust, and Self-Disclosure on Online Social Networks.
Entropy, 2019

A robust and efficient mutual authentication and key agreement scheme with untraceability for WBANs.
Comput. Networks, 2019

Analysis and improvement of a secure key management protocol for e-health applications.
Comput. Electr. Eng., 2019

The Impact of Students' Pre-Knowledge on Learning Computer Programming.
Proceedings of the Eighth Workshop on Software Quality Analysis, 2019

2018
A Systematic Review of the Use of Blockchain in Healthcare.
Symmetry, 2018

Survey on security in intra-body area network communication.
Ad Hoc Networks, 2018

EduCTX: A Blockchain-Based Higher Education Credit Platform.
IEEE Access, 2018

Introducing Public-Key infrastructure for SiebogJS JavaScript-based Agent Middleware.
Proceedings of the 8th International Conference on Web Intelligence, Mining and Semantics, 2018

Adding security to the JavaScript-based agent middleware SiebogJS.
Proceedings of the 41st International Convention on Information and Communication Technology, 2018

Intercultural challenges in blended learning and blended mobility.
Proceedings of the 17th International Conference on Information Technology Based Higher Education and Training, 2018

2016
An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment.
Ad Hoc Networks, 2016

2015
Privacy-Aware Authentication in the Internet of Things.
IACR Cryptol. ePrint Arch., 2015

Privacy antecedents for SNS self-disclosure: The case of Facebook.
Comput. Hum. Behav., 2015

Influence of Cultural Issues on Data Quality Dimensions.
Proceedings of the 4th Workshop on Software Quality Analysis, 2015

Application Challenges of the I/W/SW-OT Paradigm.
Proceedings of the 4th Workshop on Software Quality Analysis, 2015

Introducing cultural issues and cultural awareness in conceptual modelling education.
Proceedings of the Information Modelling and Knowledge Bases XXVII, 2015

Security and Privacy related Issues in the Internet of Things.
Proceedings of the Information Modelling and Knowledge Bases XXVII, 2015

2014
Notes on "A Temporal-Credential-Based Mutual Authentication and Key Agreement Scheme for Wireless Sensor Networks".
Wirel. Pers. Commun., 2014

The (in)adequacy of applicative use of quantum cryptography in wireless sensor networks.
Quantum Inf. Process., 2014

Best-Fit Learning Curve Model for the C4.5 Algorithm.
Informatica, 2014

A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion.
Ad Hoc Networks, 2014

Case study of a student with a disability - A personalised approach.
Proceedings of the 2014 Information Technology Based Higher Education and Training, 2014

Intercultural Collaboration in a Virtual Environment.
Proceedings of the Information Modelling and Knowledge Bases XXVI, 2014

Preparation on cultural differences for all.
Proceedings of the 2014 IEEE Global Engineering Education Conference, 2014

2013
Usability and Privacy Aspects of Moodle: Students' and Teachers' Perspective.
Informatica (Slovenia), 2013

2012
An improved two-party identity-based authenticated key agreement protocol using pairings.
J. Comput. Syst. Sci., 2012

Learning Process Termination Criteria.
Informatica, 2012

Cultural and Lingual Awareness for the Global Conceptual Modeling.
Proceedings of the Information Modelling and Knowledge Bases XXIV, 2012

2011
Virtual Education Centre for the Development of Expert Skills and Competencies.
Int. J. Adv. Corp. Learn., 2011

2010
Attacks and Improvement of an Efficient Remote Mutual Authentication and Key Agreement Scheme.
Cryptologia, 2010

Two proposed identity-based three-party authenticated key agreement protocols from pairings.
Comput. Secur., 2010

Need for the Intercultural Awareness in Erasmus Mobility - Administrative Point of View.
Proceedings of the Key Competencies in the Knowledge Society, 2010

2009
Comparative Study of Tripartite Identity-Based Authenticated Key Agreement Protocols.
Informatica (Slovenia), 2009

Two improved two-party identity-based authenticated key agreement protocols.
Comput. Stand. Interfaces, 2009

Patient Education on Safety and Privacy.
Proceedings of the Medical Informatics in a United and Healthy Europe - Proceedings of MIE 2009, The XXIInd International Congress of the European Federation for Medical Informatics, Sarajevo, Bosnia and Herzegovina, August 30, 2009

Medical Personal Data in Secure Information Systems.
Proceedings of the Information Systems: Modeling, 2009

Aspects in Information Modelling and Knowledge Bases Research.
Proceedings of the Information Modelling and Knowledge Bases XXI, 2009

An Improved Authentication Protocol Based on One-Way Hash Functions and Diffie-Hellman Key Exchange.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Improvement of the Peyravian-Jeffries's user authentication protocol and password change protocol.
Comput. Commun., 2008

Conceptual Model - Meeting of Cultures.
Proceedings of the Information Systems and e-Business Technologies, 2008

Cryptanalysis and Improvement of an "Improved Remote Authentication Scheme with Smart Card".
Proceedings of the The Third International Conference on Availability, 2008

2007
Searching for Messages Conforming to Arbitrary Sets of Conditions in SHA-256.
Proceedings of the Research in Cryptology, Second Western European Workshop, 2007

Teaching of Information Security in the "Health Care and Nursing" Postgraduate program.
Proceedings of the New Approaches for Security, 2007


  Loading...