default search action
Borka Jerman-Blazic
Person information
- affiliation: University of Ljubljana, Slovenia
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j44]Borka Jerman Blazic:
Changing the landscape of cybersecurity education in the EU: Will the new approach produce the required cybersecurity skills? Educ. Inf. Technol. 27(3): 3011-3036 (2022) - 2020
- [j43]Borka Jerman Blazic, Andrej Jerman-Blazic:
Overcoming the digital divide with a modern approach to learning digital skills for the elderly adults. Educ. Inf. Technol. 25(1): 259-279 (2020) - [c34]Primoz Cigoj, Ziva Stepancic, Borka Jerman Blazic:
A Large-Scale Security Analysis of Web Vulnerability: Findings, Challenges and Remedies. ICCSA (5) 2020: 763-771
2010 – 2019
- 2019
- [j42]Primoz Cigoj, Borka Jerman Blazic:
An Intelligent and Automated WCMS Vulnerability-Discovery Tool: The Current State of the Web. IEEE Access 7: 175466-175473 (2019) - [c33]Borka Jerman Blazic, Tomaz Klobucar:
Advancement in Cybercrime Investigation - The New European Legal Instruments for Collecting Cross-border E-evidence. ICITS 2019: 858-867 - 2018
- [c32]Borka Jerman Blazic, Primoz Cigoj, Andrej Jerman-Blazic:
Learning Digital Skils for Elderly People by using Touch Screen Technology and Learning Games: A Case Study. CSEDU (2) 2018: 222-229 - 2017
- [j41]Tanja Pavleska, Borka Jerman Blazic:
User bias in online trust systems: aligning the system designers' intentions with the users' expectations. Behav. Inf. Technol. 36(4): 404-421 (2017) - [c31]Martin Mihajlov, Borka Jerman-Blazic:
Eye Tracking Graphical Passwords. AHFE (9) 2017: 37-44 - [c30]Matej Babic, Borka Jerman-Blazic:
New method for determination complexity using in AD HOC cloud computing. MIPRO 2017: 188-191 - 2016
- [j40]Borka Jerman-Blazic, Nikolaos Matskanis, Rok Bojanc:
Semantic Ontology Design for a Multi-Cooperative First Responder Interoperable Platform. Comput. Informatics 35(6): 1249-1276 (2016) - [j39]Primoz Cigoj, Borka Jerman Blazic:
An Advanced Educational Tool for Digital Forensic Engineering. Int. J. Emerg. Technol. Learn. 11(3): 15-23 (2016) - [j38]Martin Mihajlov, Borka Jerman-Blazic, Anita Ciunova Shuleska:
Why That Picture? Discovering Password Properties in Recognition-Based Graphical Authentication. Int. J. Hum. Comput. Interact. 32(12): 975-988 (2016) - [j37]Cormac Callanan, Borka Jerman-Blazic, Andrej Jerman-Blazic:
User awareness and tolerance of privacy abuse on mobile Internet: An exploratory study. Telematics Informatics 33(1): 109-128 (2016) - [c29]Blaz Ivanc, Borka Jerman Blazic:
Information Security Aspects of the Public Safety Data Interoperability Network. EISIC 2016: 88-91 - [c28]Borka Jerman Blazic, Tomaz Klobucar:
Missing Solutions in the Fight against Cybercrime and Cyberterrorism - The New EU Research Agenda. EISIC 2016: 128-131 - [c27]Matej Babic, Borka Jerman-Blazic:
New cybercrime taxonomy of visualization of data mining process. MIPRO 2016: 349-351 - 2015
- [j36]Primoz Cigoj, Borka Jerman Blazic:
An Authentication and Authorization Solution for a Multiplatform Cloud Environment. Inf. Secur. J. A Glob. Perspect. 24(4-6): 146-156 (2015) - [j35]Borka Jerman-Blazic, Andrej Jerman-Blazic, Tanja Arh:
A Virtual User Community: Cultural Backgrounds in the Design of an Internet-Based Service. J. Glob. Inf. Manag. 23(2): 24-47 (2015) - [c26]Primoz Cigoj, Borka Jerman Blazic, Tomaz Klobucar:
An Approach in the Design of Common Authentication Solution for a Multi-Platform Cloud Environment. CLOSER 2015: 365-372 - [c25]Primoz Cigoj, Borka Jerman Blazic:
An Innovative Approach in Digital Forensic Education and Training. World Conference on Information Security Education 2015: 101-110 - 2014
- [j34]Cormac Callanan, Borka Jerman-Blazic:
User Understanding of Privacy In Emerging Mobile Markets. IEEE Technol. Soc. Mag. 33(4): 48-56 (2014) - [c24]Borka Jerman Blazic:
Designing a large cross-border secured eID service for e-government and e-business. ICMCS 2014: 657-662 - 2013
- [c23]Svetlana Sapelova, Borka Jerman-Blazic:
Privacy Issues in Cross-Border Identity Management Systems: Pan-European Case. Privacy and Identity Management 2013: 214-223 - 2012
- [j33]Rok Bojanc, Borka Jerman-Blazic, Metka Tekavcic:
Managing the investment in information security technology by use of a quantitative modeling. Inf. Process. Manag. 48(6): 1031-1052 (2012) - [c22]Tanja Azderska, Borka Jerman Blazic:
Trust as an Organismic Trait of E-Commerce Systems. CD-ARES 2012: 161-175 - 2011
- [j32]Martin Mihajlov, Borka Jerman-Blazic:
On designing usable and secure recognition-based graphical authentication mechanisms. Interact. Comput. 23(6): 582-593 (2011) - [j31]Borka Jerman-Blazic:
Four Scenarios for Future Evolution of the Internet. IEEE Technol. Soc. Mag. 30(4): 39-46 (2011) - [c21]Martin Mihajlov, Borka Jerman-Blazic, Saso Josimovski:
Quantifying Usability and Security in Authentication. COMPSAC 2011: 626-629 - [c20]Martin Mihajlov, Borka Jerman-Blazic, Marko Ilievski:
Recognition-Based Graphical Authentication with Single-Object Images. DeSE 2011: 203-208 - [c19]Martin Mihajlov, Saso Josimovski, Borka Jerman-Blazic:
A conceptual framework for evaluating usable security in authentication mechanisms - usability perspectives. NSS 2011: 332-336 - [c18]Tanja Azderska, Borka Jerman Blazic:
A Novel Systemic Taxonomy of Trust in the Online Environment - (Invited Paper). ServiceWave 2011: 122-133 - 2010
- [c17]Borka Jerman-Blazic:
The Future of the Internet: Tussles and Challenges in the Evolution Path as Identified. ICDS 2010: 25-30 - [e2]Claus Atzenbeck, Oana Dini, Michael Hitson, Borka Jerman-Blazic:
Second International Conference on Information, Process, and Knowledge Management, eKNOW 2010, Saint Maarten, Netherlands, Antilles, February 10-15, 2010. IEEE Computer Society 2010, ISBN 978-0-7695-3956-0 [contents]
2000 – 2009
- 2008
- [j30]Rok Bojanc, Borka Jerman-Blazic:
Towards a standard approach for quantifying an ICT security investment. Comput. Stand. Interfaces 30(4): 216-222 (2008) - [j29]Rok Bojanc, Borka Jerman-Blazic:
An economic modelling approach to information security risk management. Int. J. Inf. Manag. 28(5): 413-422 (2008) - [j28]Borka Jerman-Blazic:
Techno-economic analysis and empirical study of network broadband investment: The case of backbone upgrading. Inf. Syst. Frontiers 10(1): 103-110 (2008) - [j27]Borka Jerman-Blazic:
The development of research and innovation policies based on a benchmarking assessment: the case of mobile communications technology R&D in the new member states of the EU. Technol. Anal. Strateg. Manag. 20(2): 201-216 (2008) - [c16]Rok Bojanc, Borka Jerman-Blazic:
Standard Approach for Quantification of the ICT Security Investment for Cybercrime Prevention. ICDS 2008: 7-14 - 2007
- [j26]Effie Lai-Chong Law, Borka Jerman-Blazic, Matic Pipan:
Analyses of user rationality and system learnability: performing task variants in user tests. Behav. Inf. Technol. 26(5): 421-436 (2007) - [j25]Aleksej Jerman Blazic, Tomaz Klobucar, Borka Dzonova-Jerman-Blazic:
Long-term trusted preservation service using service interaction protocol and evidence records. Comput. Stand. Interfaces 29(3): 398-412 (2007) - [j24]Borka Jerman-Blazic:
Comparative Study and Techno-Economic Analysis of Broadband Backbone Upgrading: a Case Study. Informatica (Slovenia) 31(3): 279-284 (2007) - [j23]Borka Dzonova-Jerman-Blazic, Effie Lai-Chong Law, Tanja Arh:
An assessment of the usability of an Internet-based education system in a cross-cultural environment: The case of the Interreg crossborder program in Central Europe. J. Assoc. Inf. Sci. Technol. 58(1): 66-75 (2007) - [j22]Tanja Arh, Borka Jerman-Blazic:
Application of Multi-Attribute Decision Making Approach to Learning Management Systems Evaluation. J. Comput. 2(10): 28-37 (2007) - [c15]Tanja Arh, Borka Jerman-Blazic:
A Multi-attribute Decision Support Model for Learning Management Systems Evaluation. ICDS 2007: 11 - [c14]Borka Jerman-Blazic, Tomaz Turk:
An Approach for Backbone Upgrading Technology Selection Based on Techno-economic Evaluation Model. ICDS 2007: 22 - 2006
- [c13]Borka Jerman-Blazic, Tomaz Klobucar, Tanja Arh, Barbara Kieslinger, Fridolin Wild, Effie Lai-Chong Law:
An approach in provision of interoperability of eLearning systems in enlarged EU - the case of iCamp project. AICT/ICIW 2006: 6 - 2005
- [j21]Dusan Gabrijelcic, Borka Jerman-Blazic, Jurij F. Tasic:
Future active Ip networks security architecture. Comput. Commun. 28(6): 688-701 (2005) - [j20]Borka Jerman-Blazic, Tomaz Klobucar:
Privacy provision in e-learning standardized systems: status and improvements. Comput. Stand. Interfaces 27(6): 561-578 (2005) - 2004
- [c12]Aleksej Jerman Blazic, Borka Dzonova-Jerman-Blazic:
Implementing trustworthy internet based long term electronic preservation service - the ekeeper project. Communications, Internet, and Information Technology 2004: 291-296 - [c11]Effie Lai-Chong Law, Borka Jerman-Blazic:
Assessment of User Rationality and Adaptivity: A Case Study. CELDA 2004: 404-408 - [c10]Aleksej Jerman Blazic, Borka Dzonova-Jerman-Blazic:
Approach for preservation the authenticity of digital objects - the Ekeeper service. ICWI 2004: 932-936 - [c9]Tomaz Klobucar, Vanja Senicar, Borka Blazic:
Privacy Issues of a Smart Space for Learning. ICALT 2004 - [c8]Lawrence Cheng, Alex Galis, Arso Savanovic, Borka Jerman-Blazic, Janez Bester:
Self-Management GRID Services - A Programmable Network Approach. International Conference on Computational Science 2004: 141-148 - [c7]Arso Savanovic, Dusan Gabrijelcic, Borka Jerman-Blazic, Janez Bester:
Implementation and Evaluation of Integrity Protection Facilities for Active Grids. International Conference on Computational Science 2004: 179-186 - 2003
- [j19]Vanja Senicar, Borka Jerman-Blazic, Tomaz Klobucar:
Privacy-Enhancing Technologies - approaches and development. Comput. Stand. Interfaces 25(2): 147-158 (2003) - [c6]Borka Dzonova-Jerman-Blazic:
Introducing New Business Models in Provision of QOS Networks. I3E 2003: 187-200 - 2002
- [j18]Arso Savanovic, Dusan Gabrijelcic, Borka Jerman-Blazic, Stamatis Karnouskos:
An active networks security architecture. Informatica (Slovenia) 26(2) (2002) - [c5]Dusan Gabrijelcic, Arso Savanovic, Borka Jerman-Blazic:
Towards security architecture for future active IP networks. Communications and Multimedia Security 2002: 183-195 - [c4]Gasper Lavrencic, Borka Jerman-Blazic, Aleksej Jerman Blazic:
Cadenus security considerations. Communications and Multimedia Security 2002: 267-278 - [e1]Borka Jerman-Blazic, Tomaz Klobucar:
Advanced Communications and Multimedia Security, IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security, September 26-27, 2002, Portoroz, Slovenia. IFIP Conference Proceedings 228, Kluwer 2002, ISBN 978-1-4020-7206-2 [contents] - 2001
- [j17]Tomaz Turk, Borka Jerman-Blazic:
Users' responsiveness in the price-controlled best-effort QoS model. Comput. Commun. 24(15-16): 1637-1647 (2001)
1990 – 1999
- 1999
- [j16]Tomaz Klobucar, Borka Jerman-Blazic:
A formalisation and evaluation of certificate policies. Comput. Commun. 22(12): 1104-1110 (1999) - [j15]Borka Jerman-Blazic, Lidia Yamamoto, Pascal Drabik, Andrew Hallan:
Distributed group collaborative work through the "Symmetric TV" model. Comput. Commun. 22(18): 1644-1651 (1999) - [j14]Tomaz Klobucar, Borka Jerman-Blazic:
An Infrastructure For Support Of Digital Signatures. Informatica (Slovenia) 23(4) (1999) - [c3]Borka Jerman-Blazic:
Modeling Multimedia Networked Systems Through Large-Scale Trials of Distributed Events. IMSA 1999: 244-248 - [c2]Borka Jerman-Blazic, Andrew Hallan:
Experience In Shaping The Virtual Lecturing Hall In An International Environment. WebNet 1999: 562-568 - 1997
- [j13]Denis Trcek, Borka Jerman-Blazic:
Certification Authorities in a Global Network - Procedures and Guidelines for a Public Key Infrastructure. Aust. Comput. J. 29(2): 41-47 (1997) - [j12]Borka Jerman-Blazic, Konstantin Chuguev, Andrej Gogala:
Standard specification extensions for provision of language and character enabled server. Comput. Commun. 20(11): 927-936 (1997) - 1996
- [j11]Borka Jerman-Blazic, Denis Trcek, Tomaz Klobucar, Franc Bracun:
A Tool for Support of Key Distribution and Validity Certificate Check in Global Directory Service. Comput. Networks ISDN Syst. 28(5): 709-717 (1996) - [j10]Borka Jerman-Blazic:
Security platforms in the telecommunication market: technologies, developments and regulations. Comput. Commun. 19(9-10): 824-829 (1996) - [j9]Denis Trcek, Borka Jerman-Blazic, Nikola Pavesic:
Security policy space definition and structuring. Comput. Stand. Interfaces 18(2): 191-195 (1996) - 1995
- [j8]Denis Trcek, Borka Jerman-Blazic:
Formal language for security services base modelling and analysis. Comput. Commun. 18(12): 921-928 (1995) - 1994
- [j7]Borka Jerman-Blazic:
Tool Supporting the Internationalisation of the Generic Network Services. Comput. Networks ISDN Syst. 27(3): 429-435 (1994) - [j6]Damijana Kerzic, Borka Jerman-Blazic, Vladimir Batagelj:
Comparison of three different approaches to the property prediction problem. J. Chem. Inf. Comput. Sci. 34(2): 391-394 (1994) - [c1]Borka Jerman-Blazic, Denis Trcek, Tomaz Klobucar, Franc Bracun:
A Tool for Support of Key Distribution and Validity Certificate Check in Global Directory Service. INDC 1994: 381-390 - 1993
- [j5]Borka Jerman-Blazic:
Open Secure Model And Its Functionality In Networks With Value-Added Services. Informatica (Slovenia) 17(1) (1993) - [j4]Denis Trcek, Borka Jerman-Blazic:
Certificates handling and their support within X.500 system. Microprocess. Microprogramming 39(2-5): 183-186 (1993) - 1990
- [j3]Milan Randic, Borka Jerman-Blazic, Nenad Trinajstic:
Development of 3-dimensional molecular descriptors. Comput. Chem. 14(3): 237-246 (1990) - [j2]Borka Jerman-Blazic:
Computer networking for the European academic community: The EUREKA project cosine. Comput. Chem. 14(4): 299-303 (1990) - [j1]Borka Jerman-Blazic:
Multilingual communications in an open system architecture. Comput. Commun. 13(5): 267-274 (1990)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 20:58 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint