Tatjana Welzer
Tatjana Welzer
University of Maribor, Faculty of Electrical Engineering and Computer Science
Verified email at um.si - Homepage
TitleCited byYear
Privacy antecedents for SNS self-disclosure: The case of Facebook
LN Zlatolas, T Welzer, M Heričko, M Hölbl
Computers in Human Behavior 45, 158-167, 2015
1102015
Students’ feedback and communication habits using Moodle
M Hölbl, T Welzer
Elektronika ir Elektrotechnika 102 (6), 63-66, 2010
502010
Adaptive k-nearest-neighbor classification using a dynamic number of nearest neighbors
S Ougiaroglou, A Nanopoulos, AN Papadopoulos, Y Manolopoulos, ...
East European Conference on Advances in Databases and Information Systems, 66-82, 2007
482007
An improved two-party identity-based authenticated key agreement protocol using pairings
M Hölbl, T Welzer, B Brumen
Journal of Computer and System Sciences 78 (1), 142-150, 2012
402012
Two proposed identity-based three-party authenticated key agreement protocols from pairings
M Hölbl, T Welzer, B Brumen
computers & security 29 (2), 244-252, 2010
342010
Usability and privacy aspects of Moodle: students' and teachers' perspective
M Ivanović, Z Putnik, Ž Komlenov, T Welzer, M Hölbl, T Schweighofer
Informatica 37 (3), 2013
262013
Two improved two-party identity-based authenticated key agreement protocols
M Hölbl, T Welzer
Computer Standards & Interfaces 31 (6), 1056-1060, 2009
262009
Medical diagnostic and data quality
T Welzer, B Brumen, I Golob, M Druovec
Proceedings of 15th IEEE Symposium on Computer-Based Medical Systems (CBMS …, 2002
252002
SIMULATION OF LINE SCALE CONTAMINATION IN CALIBRATION UNCERTAINTY MODEL.
M Druzovec, B Acko, A Godina, T Welzer
International Journal of Simulation Modelling (IJSIMM) 7 (3), 2008
222008
A universal system for fair non-repudiable certified e-mail without a trusted third party
A Paulin, T Welzer
Computers & security 32, 207-218, 2013
212013
Applying the MAS-CommonKADS methodology to the flights reservation problem: Integrating coordination and expertise
I Press
Knowledge-Based Software Engineering: Proceedings of the Fifth Joint …, 2002
212002
Improvement of the Peyravian–Jeffries’s user authentication protocol and password change protocol
M Hölbl, T Welzer, B Brumen
Computer Communications 31 (10), 1945-1951, 2008
202008
Performance assessment framework for distributed object architectures
MB Juricč, T Welzer, I Rozman, M Heričko, B Brumen, T Domajnko, ...
East European Conference on Advances in Databases and Information Systems …, 1999
191999
Awareness of Culture in e-learning
T Welzer, M Družovec, P Cafnik, MZ Venuti, H Jaakkola
2010 9th International Conference on Information Technology Based Higher …, 2010
182010
Facebook as a teaching tool
L Nemec, M Hölbl, J Burkeljca, T Welzer
2011 Proceedings of the 22nd EAEEIE Annual Conference (EAEEIE), 1-4, 2011
172011
Assessment of classification models with small amounts of data
B Brumen, MB Jurič, T Welzer, I Rozman, H Jaakkola, A Papadopoulos
Informatica 18 (3), 343-362, 2007
162007
Experiences and privacy issues-usage of Moodle in Serbia and Slovenia
M Ivanović, T Welzer, Z Putnik, M Hölbl, Ž Komlenov, I Pribela, ...
Interactive Computer Aided Learning, ICL, 416-423, 2009
152009
Meta data model for database design
T Welzer, J Eder
International Conference on Database and Expert Systems Applications, 677-680, 1993
151993
Learning technology for education in cloud
L Uden, D Liberona, T Welzer
Third International Workshop, LTEC 2014, 2014
142014
Early assessment of classification performance
B Brumen, I Golob, H Jaakkola, T Welzer, I Rozman
Proceedings of the second workshop on Australasian information security …, 2004
142004
The system can't perform the operation now. Try again later.
Articles 1–20