<Record><identifier xmlns="http://purl.org/dc/elements/1.1/">URN:NBN:SI:doc-NT4QRSRA</identifier><date>2023</date><creator>Al Bazar, Hussein</creator><relation>documents/doc/N/URN_NBN_SI_doc-NT4QRSRA_001.pdf</relation><relation>documents/doc/N/URN_NBN_SI_doc-NT4QRSRA_001.txt</relation><format format_type="volume">47</format><format format_type="issue">5</format><format format_type="type">article</format><format format_type="extent">str. 159-172</format><identifier identifier_type="DOI">10.31449/inf.v47i5.4627</identifier><identifier identifier_type="ISSN">1854-3871</identifier><identifier identifier_type="COBISSID">207700739</identifier><identifier identifier_type="URN">URN:NBN:SI:doc-NT4QRSRA</identifier><language>eng</language><publisher publisher_location="Ljubljana">Informatika</publisher><source>Informatica (Ljubljana)</source><rights>BY</rights><subject language_type_id="slv">algoritem Schnorr Signcryption</subject><subject language_type_id="slv">avtentifikacija uporabnikov</subject><subject language_type_id="slv">dostop do virov</subject><subject language_type_id="slv">dvofaktorska avtentifikacija</subject><subject language_type_id="slv">informacijska varnost</subject><subject language_type_id="slv">kriptografski algoritmi</subject><subject language_type_id="slv">umetna inteligenca</subject><title>An adaptive two-factor authentication scheme based on the usage of Schnorr signcryption algorithm</title></Record>