Muhamed Turkanović

Muhamed Turkanović
University of Maribor | UM · Faculty of Electrical Engineering and Computer Science

PhD

About

47
Publications
27,130
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,760
Citations
Citations since 2016
37 Research Items
1725 Citations
20162017201820192020202120220100200300
20162017201820192020202120220100200300
20162017201820192020202120220100200300
20162017201820192020202120220100200300
Additional affiliations
January 2017 - December 2018
University of Maribor
Position
  • Professor (Assistant)
Education
October 2011 - February 2016
University of Maribor
Field of study
  • Computer Science
September 2006 - September 2011
University of Maribor, Faculty of Electrical Engineering and Computer Science
Field of study
  • Computer Science

Publications

Publications (47)
Article
The concept of Internet of Things (IOT), which is already at our front doors, is that every object in the Internet infrastructure (II) is interconnected into a global dynamic expanding network. Sensors and smart objects are beside classical computing devices key parties of the IOT. We can already exploit the benefits of the IOT by using various wea...
Article
Full-text available
Recently quantum computation and cryptography principles are exploited in the design of security systems for wireless sensor networks (WSNs), which are consequently named as quantum WSN. Quantum cryptography is presumably secure against any eavesdropper and thus labeled as providing unconditional security. This paper tries to analyze the aspect of...
Article
The idea of the Internet of Things (IOT) notion is that everything within the global network is accessible and interconnected. As such Wireless Sensor Networks (WSN) play a vital role in such an environment, since they cover a wide application field. Such interconnection can be seen from the aspect of a remote user who can access a single desired s...
Article
Full-text available
Xue et al. recently proposed an innovative mutual authentication and key agreement scheme for wireless sensor networks based on temporal credential using smart cards. However, in this paper we demonstrate that their scheme is vulnerable to password guessing attacks, node capture attacks and denial-of-service attacks. Furthermore we show that their...
Article
Full-text available
User authentication is an important issue in wireless sensor networks. Das et al. recently proposed a dynamic password-based user authentication scheme for hierarchical wireless sensor networks, which provides high security and a simple authentication approach. In this paper we present a flaw in Das et al.'s scheme that makes it infeasible for real...
Conference Paper
Evropska komisija je junija 2021 predlagala novo uredbo eIDAS 2.0, s katero si prizadeva zagotoviti zaupanja vredno, varno in široko uporabno evropsko digitalno identiteto, ki bo vsem Evropejcem omogočila digitalno dokazovanje svoje identitete z namenom dostopanja do digitalnih storitev po vsej Evropski uniji. V okviru uredbe je izdala zahtevo, da...
Conference Paper
Kripto denarnice omogočajo interakcijo z verigami blokov (angl. blockchain) in decentraliziranimi aplikacijami (angl. decentralized application, dApp), ter posledično upravljanje z zamenljivi ali nezamenljivimi žetoni (angl. NFT), interakcijo z navideznimi svetovi (angl. metaverse) itn. Danes je vsekakor najpriljubljenejša denarnica MetaMask. Ker s...
Article
Full-text available
Self-Sovereign Identity (SSI) is a novel and emerging, decentralized digital identity approach that enables entities to control and manage their digital identifiers and associated identity data fully while enhancing trust, privacy, security, and the many other properties identified and analyzed in this paper. The paper provides an overview and clas...
Article
Številni škandali povezani s kakovostjo, poreklom ali oporečnostjo prehranskih izdelkov, ki smo jim bili priča v zadnjih letih, so omajali zaupanje potrošnikov v prehranske izdelke na naših policah. Potrošniki v odgovor na škandale pričakujejo večjo transparentnost porekla in načina proizvodnje prehranskih produktov. Slednje toliko bolj velja za pr...
Conference Paper
Samoupravljana identiteta je nastajajoč, decentraliziran pristop upravljanja identitet, ki omogoča uporabnikom, da v celoti nadzorujejo in upravljajo svojo digitalno identiteto z uporabo digitalne denarnice, s čimer se poveča zaupanje, zasebnost in varnost. V sklopu prispevka predstavljamo raziskavo, v kateri smo preko analize SSI digitalnih denarn...
Preprint
Full-text available
Self-Sovereign Identity (SSI) is a novel and emerging, decentralized identity approach that enables entities to fully control and manage their digital identifiers and associated identity data while enhances trust, privacy, security, and many other properties analyzed in this paper. The paper provides an overview of the SSI properties, focusing on a...
Article
Full-text available
Self-Sovereign Identity is an emerging, user-centric, decentralized identity approach utilizing some form of decentralized technology. It provides a means for digital identification without reliance on any external authority, enabling entities to control their identity and data flow during digital interactions while enhancing security and privacy....
Article
As with any other database solution, graph databases also need to be able to implement business rules related to a given application domain. At the moment, aside from integrity constraints, there is a limited number of mechanisms for business rules implementation in Graph Database Management Systems (GDBMSs). The underlying property graph data mode...
Patent
Full-text available
The method and device for storing de-identified pairs of linking and actual data and the control of re-identification of the pseudonymized linking data solve the technical problem related to the deletion and restriction of the inspection of the data stored in a permanent immutable, distributed and decentralized storage. In the storing process, the...
Article
Full-text available
Blockchain technology is increasingly considered for enterprise, as well for public service solutions, it poses a challenge of aligning its identity management scheme with the Public Key Infrastructure and the Qualified Digital Certificates issued by Qualified Trust Service Providers. To solve this challenge, we present a solution in the form of an...
Conference Paper
In recent times, the digitalization of urban areas has got considerable attention from the public. As a side effect, there has also been great interest in the digitalization of the rural world or the so-called Smart Villages. Smart Villages refer to the improvement of infrastructure management and planning to fight against depopulation and low popu...
Chapter
Full-text available
The rise of blockchain technology has inspired changes in the architecture of modern applications in various domains (e.g., finances, transport, etc.). Moving from a centralized data storage paradigm to the distributed ledger technology without central data storage raises important challenges, mostly in terms of scalability, integrity, and privacy....
Article
Full-text available
Currently, developers and researchers are dedicated to finding better ways to achieve greater scalability of various blockchain platforms. Focused on the Ethereum blockchain platform, the state channels are currently the only maturely researched and implemented a solution for achieving scalability. However, there are still several problems, such as...
Chapter
An adequate project matching and recruitment process are of high importance for any company and organization. Many factors, such as rapid growth, sick leaves, or sudden new skill demands, can influence the rushed hiring decisions, which could lead to choosing an inadequate person for a project, and, consequently, produce a negative outcome. Several...
Article
Full-text available
The basis of blockchain-related data, stored in distributed ledgers, are digitally signed transactions. Data can be stored on the blockchain ledger only after a digital signing process is performed by a user with a blockchain-based digital identity. However, this process is time-consuming and not user-friendly, which is one of the reasons blockchai...
Conference Paper
The concept of smartness is an essential topic that was only recently extended to rural areas. Although smartness is already incorporated strongly into numerous urban environments, differences between cities and villages prevent direct transfer of the methods and tools used for the smart transformation. To increase the awareness of newly developed...
Chapter
Students taking a Databases Course have different pre-knowledge of Conceptual Database Modelling. At the beginning of the course, they were asked to self-evaluate their knowledge of database design concepts. We have compared the results of self-evaluation of students with Technical and General High School education, as well as the results they achi...
Chapter
In this work, we have developed the first version of a smartness assessment framework that allows the representatives from a village to make a self-evaluation of its current status based on smartness criteria identified by an international group of experts. The framework allows a detailed evaluation of six different aspects including Mobility, Gove...
Conference Paper
Full-text available
Tehnologija veriženja blokov (ang. blockchain) kot del tehnologije porazdeljene knjige (ang. distributed ledger technology-DLT) ima prednosti kakor tudi slabosti. Poglavitna slabost je razširljivost, saj je tehnologija neprimerna za sočasno procesiranje velike količine podatkov. Omenjeno pomanjkljivost naslavljajo nove generacije platform DLT. Prim...
Chapter
Full-text available
Blockchain technology is showing its potential to disrupt established business processes. Four types of blockchain initiatives have been identified: Record keeper, efficiency play, digital asset market, and blockchain disruptor. Many different applications have also been emerging within the educational domain, following a student or institution-cen...
Article
Full-text available
Wearable devices have recently received considerable interest due to their great promise for a plethora of applications. Increased research efforts are oriented towards a non-invasive monitoring of human health as well as activity parameters. A wide range of wearable sensors are being developed for real-time non-invasive monitoring. This paper prov...
Article
Full-text available
Relational databases are one of the pillars of information systems and as a consequence conceptual and logical design can be seen as the foundation of almost every application regardless of the platform. Nevertheless, little research has been done so far on the effectiveness of teaching approaches to database basic concepts and design. This paper i...
Article
Full-text available
Blockchain technology enables the creation of a decentralized environment where transactions and data are not under the control of any third party organization. Any transaction ever completed is recorded in a public ledger in a verifiable and permanent way. Based on blockchain technology, we propose a global higher education credit platform, named...
Article
The article summarizes the key findings of the doctoral thesis written by the author. The content of the thesis is based on the research fields of authentication and key agreement protocols (AKAP) for wireless sensor networks, and the internet of things (IOT). They key contribution of the thesis is a novel user AKAP for ad hoc networks, which is ta...
Thesis
Full-text available
In recent years the attention of researchers has focused on the domain of ad hoc networks, and on ensuring security of these networks using cryptographic primitives. Such networks represent a new challenge for researchers due to their specific characteristics, in particular energy constraints. Therefore the main challenge is to find a trade off bet...
Article
Received: February 22, 2016 The article summarizes the key findings of the doctoral thesis written by the author. The content of the thesis is based on the research fields of authentication and key agreement protocols (AKAP) for wireless sensor networks, and the internet of things (IOT). They key contribution of the thesis is a novel user AKAP for...
Conference Paper
Full-text available
The Internet of Things (IOT) paradigm is increasingly infiltrating into our lives. Although still not standardised it already expanded into new paradigms, e.g. Web of Things and Social Web/Internet of Things. Despite the fact that numerous IOT applications already exists, there does not exist any comprehensive methodology or tool for developing IOT...
Article
Full-text available
Today's databases store information with sensitivity levels that range from public to highly sensitive, hence ensuring confidentiality can be highly important, but also requires costly control. This paper focuses on the inference problem on different database structures. It presents possible treats on privacy with relation to the inference, and con...
Conference Paper
Full-text available
Zaradi hitre evolucije tehnologije smo vedno bolj obdani z vseprisotno inteligentnimi, med seboj povezanimi napravami, ki nam ponujajo nov vidik našega vsakdanjega življenja. Koncept Interneta stvari (angl. Internet of Things) je uporaba standardiziranih komunikacijskih protokolov in omrežne infrastrukture z namenom razširjanja navidezno prostorski...
Article
Electronic communication is nowadays ubiquitous, irreplaceable and powerful, but because of its significance, the impact on an individual, if something wrong happens, is negligible. A literature review was conducted with the aim of analyzing the term of electronic communication itself as well the aspect of its security. The analysis was performed o...

Network

Cited By

Projects

Projects (3)
Project
Facilitating the digital transformation of villages in the Alpine Space
Project
The project aims to improve the framework conditions for innovation and the quality of life in villages and small cities of the Alpine Space through more sustainable integrated solutions facilitated by Information and Communication Technologies (ICT). This includes user driven applied innovation, technically assisted planning, participatory approach, openly accessible and shareable knowledge, higher efficiency, smart use of energy and better everyday smart solutions on different levels through analysis of the SV ecosystem, the elaboration of SV toolboxes for TAs, an electronic platform as well as recommendations. The project follows a SV approach and is conceived in the context of the EC Action for Smart Villages launched in April 2017.