<Record><identifier xmlns="http://purl.org/dc/elements/1.1/">URN:NBN:SI:DOC-DH1IFTXC</identifier><date>2009</date><creator>Brumen, Boštjan</creator><creator>Hölbl, Marko</creator><creator>Welzer-Družovec, Tatjana</creator><relation>documents/doc/D/URN_NBN_SI_doc-DH1IFTXC_001.pdf</relation><relation>documents/doc/D/URN_NBN_SI_doc-DH1IFTXC_001.txt</relation><format format_type="issue">3</format><format format_type="volume">33</format><format format_type="type">article</format><format format_type="extent">str. 347-355</format><identifier identifier_type="ISSN">0350-5596</identifier><identifier identifier_type="COBISSID">13512982</identifier><identifier identifier_type="URN">URN:NBN:SI:doc-DH1IFTXC</identifier><language>eng</language><publisher>Slovensko društvo Informatika</publisher><source>Informatica (Ljubljana)</source><rights>InC</rights><subject language_type_id="slv">avtentičnost</subject><subject language_type_id="slv">identiteta</subject><subject language_type_id="slv">informatika</subject><subject language_type_id="eng">information science</subject><subject language_type_id="eng">security</subject><subject language_type_id="slv">varnost</subject><title>Comparative study of tripartite identity-based authenticated key agreement protocols</title></Record>