


default search action
Marko Hölbl
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j23]Anjali Bansal
, Saru Kumari
, Nishant Doshi
, Mohammed Amoon
, Marko Hölbl
:
Security Enhanced CLS and CL-AS Scheme Without Pairings for VANETs. IEEE Access 13: 42508-42520 (2025) - 2023
- [c23]Marko Hölbl
, Vladimir Zadorozhny, Tatjana Welzer-Druzovec, Marko Kompara, Lili Nemec Zlatolas:
Browser Fingerprinting: Overview and Open Challenges. EJC 2023: 297-307 - 2022
- [j22]Lili Nemec Zlatolas
, Natasa Feher, Marko Hölbl
:
Security Perception of IoT Devices in Smart Homes. J. Cybersecur. Priv. 2(1): 65-74 (2022) - 2020
- [e1]Marko Hölbl
, Kai Rannenberg, Tatjana Welzer:
ICT Systems Security and Privacy Protection - 35th IFIP TC 11 International Conference, SEC 2020, Maribor, Slovenia, September 21-23, 2020, Proceedings. IFIP Advances in Information and Communication Technology 580, Springer 2020, ISBN 978-3-030-58200-5 [contents]
2010 – 2019
- 2019
- [j21]Marko Kompara, Saru Kumari
, Marko Hölbl
:
Analysis and improvement of a secure key management protocol for e-health applications. Comput. Electr. Eng. 73: 97-113 (2019) - [j20]Marko Kompara, SK Hafizul Islam
, Marko Hölbl
:
A robust and efficient mutual authentication and key agreement scheme with untraceability for WBANs. Comput. Networks 148: 196-213 (2019) - [j19]Lili Nemec Zlatolas
, Tatjana Welzer, Marko Hölbl
, Marjan Hericko
, Aida Kamisalic
:
A Model of Perception of Privacy, Trust, and Self-Disclosure on Online Social Networks. Entropy 21(8): 772 (2019) - [c22]Marko Hölbl, Lili Nemec Zlatolas:
The Impact of Students' Pre-Knowledge on Learning Computer Programming. SQAMIA 2019 - 2018
- [j18]Muhamed Turkanovic
, Marko Hölbl
, Kristjan Kosic, Marjan Hericko, Aida Kamisalic
:
EduCTX: A Blockchain-Based Higher Education Credit Platform. IEEE Access 6: 5112-5127 (2018) - [j17]Marko Kompara, Marko Hölbl
:
Survey on security in intra-body area network communication. Ad Hoc Networks 70: 23-43 (2018) - [j16]Marko Hölbl
, Marko Kompara
, Aida Kamisalic
, Lili Nemec Zlatolas
:
A Systematic Review of the Use of Blockchain in Healthcare. Symmetry 10(10): 470 (2018) - [c21]Tatjana Welzer, Nuno Escudeiro, Marjan Druzovec, Marko Hölbl:
Intercultural challenges in blended learning and blended mobility. ITHET 2018: 1-6 - [c20]Aleksandra Aleksic
, Mirjana Ivanovic
, Marko Hölbl
, Tatjana Welzer, Milan Vidakovic:
Adding security to the JavaScript-based agent middleware SiebogJS. MIPRO 2018: 462-466 - [c19]Marko Hölbl, Luka Hrgarek, Mirjana Ivanovic
, Tatjana Welzer, Milan Vidakovic:
Introducing Public-Key infrastructure for SiebogJS JavaScript-based Agent Middleware. WIMS 2018: 45:1-45:6 - 2017
- [i2]Muhamed Turkanovic, Marko Hölbl, Kristjan Kosic, Marjan Hericko, Aida Kamisalic:
EduCTX: A blockchain-based higher education credit platform. CoRR abs/1710.09918 (2017) - 2016
- [j15]Mohammad Sabzinejad Farash
, Muhamed Turkanovic
, Saru Kumari
, Marko Hölbl
:
An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment. Ad Hoc Networks 36: 152-176 (2016) - 2015
- [j14]Lili Nemec Zlatolas
, Tatjana Welzer, Marjan Hericko, Marko Hölbl
:
Privacy antecedents for SNS self-disclosure: The case of Facebook. Comput. Hum. Behav. 45: 158-167 (2015) - [c18]Hannes Groß, Marko Hölbl
, Daniel Slamanig
, Raphael Spreitzer
:
Privacy-Aware Authentication in the Internet of Things. CANS 2015: 32-39 - [c17]Tatjana Welzer, Marjan Druzovec, Lili Nemec Zlatolas
, Marko Hölbl, Hannu Jaakkola
, Mirjana Ivanovic
, Milos Radovanovic
:
Introducing cultural issues and cultural awareness in conceptual modelling education. EJC 2015: 314-320 - [c16]Marko Hölbl
, Tatjana Welzer, Lili Nemec Zlatolas
:
Security and Privacy related Issues in the Internet of Things. EJC 2015: 321-326 - [c15]Muhamed Turkanovic, Marko Hölbl:
Application Challenges of the I/W/SW-OT Paradigm. SQAMIA 2015: 69-74 - [c14]Tatjana Welzer, Marko Hölbl, Lili Nemec Zlatolas, Marjan Druzovec:
Influence of Cultural Issues on Data Quality Dimensions. SQAMIA 2015: 75-80 - [i1]Hannes Groß, Marko Hölbl, Daniel Slamanig, Raphael Spreitzer:
Privacy-Aware Authentication in the Internet of Things. IACR Cryptol. ePrint Arch. 2015: 1110 (2015) - 2014
- [j13]Muhamed Turkanovic
, Bostjan Brumen, Marko Hölbl
:
A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion. Ad Hoc Networks 20: 96-112 (2014) - [j12]Bostjan Brumen, Ivan Rozman, Marjan Hericko, Ales Cernezel, Marko Hölbl
:
Best-Fit Learning Curve Model for the C4.5 Algorithm. Informatica 25(3): 385-399 (2014) - [j11]Muhamed Turkanovic
, Marko Hölbl
:
The (in)adequacy of applicative use of quantum cryptography in wireless sensor networks. Quantum Inf. Process. 13(10): 2255-2275 (2014) - [j10]Muhamed Turkanovic
, Marko Hölbl
:
Notes on "A Temporal-Credential-Based Mutual Authentication and Key Agreement Scheme for Wireless Sensor Networks". Wirel. Pers. Commun. 77(2): 907-922 (2014) - [c13]Tatjana Welzer, Marko Hölbl
, Marjan Druzovec, Hannu Jaakkola
:
Preparation on cultural differences for all. EDUCON 2014: 1097-1100 - [c12]Tatjana Welzer, Hannu Jaakkola
, Marko Hölbl
, Marjan Druzovec, Anthony E. Ward:
Intercultural Collaboration in a Virtual Environment. EJC 2014: 457-463 - [c11]Marjan Druzovec, Vladka Kozuh Ledinek, Marko Hölbl, Tatjana Welzer:
Case study of a student with a disability - A personalised approach. ITHET 2014: 1-5 - 2013
- [j9]Mirjana Ivanovic, Zoran Putnik, Zivana Komlenov, Tatjana Welzer, Marko Hölbl, Tina Schweighofer:
Usability and Privacy Aspects of Moodle: Students' and Teachers' Perspective. Informatica (Slovenia) 37(3): 221-230 (2013) - 2012
- [j8]Bostjan Brumen, Marko Hölbl, Katja Harej Pulko, Tatjana Welzer, Marjan Hericko, Matjaz B. Juric, Hannu Jaakkola:
Learning Process Termination Criteria. Informatica 23(4): 521-536 (2012) - [j7]Marko Hölbl
, Tatjana Welzer, Bostjan Brumen
:
An improved two-party identity-based authenticated key agreement protocol using pairings. J. Comput. Syst. Sci. 78(1): 142-150 (2012) - [c10]Tatjana Welzer, Hannu Jaakkola
, Marjan Druzovec, Marko Hölbl
:
Cultural and Lingual Awareness for the Global Conceptual Modeling. EJC 2012: 271-276 - 2011
- [j6]Tatjana Welzer, Metka Zoric Venuti, Anthony E. Ward, Marko Hölbl, Marjan Druzovec:
Virtual Education Centre for the Development of Expert Skills and Competencies. Int. J. Adv. Corp. Learn. 4(4): 51-54 (2011) - 2010
- [j5]Marko Hölbl
, Tatjana Welzer, Bostjan Brumen
:
Two proposed identity-based three-party authenticated key agreement protocols from pairings. Comput. Secur. 29(2): 244-252 (2010) - [j4]Marko Hölbl
, Tatjana Welzer, Bostjan Brumen
:
Attacks and Improvement of an Efficient Remote Mutual Authentication and Key Agreement Scheme. Cryptologia 34(1): 52-59 (2010) - [c9]Tatjana Welzer, Marjan Druzovec, Marko Hölbl, Mirjam Bonacic:
Need for the Intercultural Awareness in Erasmus Mobility - Administrative Point of View. Key Competencies in the Knowledge Society 2010: 435-439
2000 – 2009
- 2009
- [j3]Marko Hölbl
, Tatjana Welzer:
Two improved two-party identity-based authenticated key agreement protocols. Comput. Stand. Interfaces 31(6): 1056-1060 (2009) - [j2]Marko Hölbl, Tatjana Welzer, Bostjan Brumen:
Comparative Study of Tripartite Identity-Based Authenticated Key Agreement Protocols. Informatica (Slovenia) 33(3): 347-355 (2009) - [c8]Marko Hölbl
, Tatjana Welzer:
An Improved Authentication Protocol Based on One-Way Hash Functions and Diffie-Hellman Key Exchange. ARES 2009: 894-898 - [c7]Aida Kamisalic, Domen Mongus, Luka Pavlic, Sandi Pohorec, Andrej Sevcnikar, Mateja Verlic, Tatjana Welzer, Marko Hölbl
:
Aspects in Information Modelling and Knowledge Bases Research. EJC 2009: 418-438 - [c6]Tatjana Welzer, Marko Hölbl
, Marjan Druzovec, Brane Klopcic, Bostjan Brumen, Hannu Jaakkola
, Mirjam Bonacic:
Medical Personal Data in Secure Information Systems. UNISCON 2009: 340-345 - [c5]Tatjana Welzer, Marko Hölbl
, Marjan Druzovec, Aida Kamisalic, Ana Habjanic:
Patient Education on Safety and Privacy. MIE 2009: 750-754 - 2008
- [j1]Marko Hölbl
, Tatjana Welzer, Bostjan Brumen
:
Improvement of the Peyravian-Jeffries's user authentication protocol and password change protocol. Comput. Commun. 31(10): 1945-1951 (2008) - [c4]Marko Hölbl
, Tatjana Welzer:
Cryptanalysis and Improvement of an "Improved Remote Authentication Scheme with Smart Card". ARES 2008: 1301-1305 - [c3]Tatjana Welzer, Zala Volcic, Bostjan Brumen, Izidor Golob, Aida Kamisalic, Marko Hölbl:
Conceptual Model - Meeting of Cultures. UNISCON 2008: 365-370 - 2007
- [c2]Tatjana Welzer, Marko Hölbl, Ana Habjanic, Bostjan Brumen
, Marjan Druzovec:
Teaching of Information Security in the "Health Care and Nursing" Postgraduate program. SEC 2007: 479-484 - [c1]Marko Hölbl
, Christian Rechberger, Tatjana Welzer:
Searching for Messages Conforming to Arbitrary Sets of Conditions in SHA-256. WEWoRC 2007: 28-38
Coauthor Index
aka: Tatjana Welzer-Druzovec

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-04-09 21:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint