Published on in Vol 15, No 8 (2013): August
Journals
Books/Policy Documents
- Bäumer F, Geierhos M, Schulze S. Information and Software Technologies. View
Conference Proceedings
- Gadicha V, Alvi A. 2015 International Conference on Communications and Signal Processing (ICCSP). A review towards enhancing authentication scheme using Image Fusion and multishared Cryptography View
- Brumen B, Ivancic R, Rozman I. 2016 Portland International Conference on Management of Engineering and Technology (PICMET). A comparison of password management policies View
- Brumen B, Cernezel A. 2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO). Brute force analysis of PsychoPass-generated Passwords View
- Jaakkola H, Makinen T, Henno J, Makela J. 2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO). Open<sup>n</sup> View
- Brumen B, Taneski V. 2015 38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO). Moore's curse on textual passwords View