Follow
Blerim Rexha
Title
Cited by
Cited by
Year
Method for transmitting protected information to a plurality of recipients
B Rexha, A Treytl
US Patent App. 10/567,972, 2007
782007
Impact of secure programming on web application vulnerabilities
B Rexha, A Halili, K Rrmoku, D Imeraj
2015 IEEE International Conference on Computer Graphics, Vision and …, 2015
232015
Assuring anonymity and privacy in electronic voting with distributed technologies based on blockchain
V Neziri, I Shabani, R Dervishi, B Rexha
Applied Sciences 12 (11), 5477, 2022
192022
Improving authentication and transparency of e-Voting system–Kosovo case
B Rexha, V Neziri, R Dervishi
International Journal of Computers and Communications 6 (1), 84-91, 2012
192012
Increasing user privacy in online transactions with X. 509 v3 certificate private extensions and smartcards
B Rexha
Seventh IEEE International Conference on E-Commerce Technology (CEC'05), 293-300, 2005
182005
Attack analysis of face recognition authentication systems using fast gradient sign method
A Musa, K Vishi, B Rexha
Applied artificial intelligence 35 (15), 1346-1360, 2021
162021
Increasing trustworthiness of face authentication in mobile devices by modeling gesture behavior and location using neural networks
B Rexha, G Shala, V Xhafa
Future Internet 10 (2), 17, 2018
152018
Analysing and comparing the digital seal according to eIDAS regulation with and without blockchain technology
V Alimehaj, A Halili, R Dervishi, V Neziri, B Rexha
International Journal of Information and Computer Security 14 (2), 171-191, 2021
92021
Survey on using blockchain technologies in electronic voting systems
V Neziri, R Dervishi, B Rexha
2021 25th International Conference on Circuits, Systems, Communications and …, 2021
82021
Assessment of success factors of e-government project implementation: challenges for the Kosovo e-government perspective
A Rexhepi, B Rexha, A Dika
Proceedings of the 6th International Conference on Theory and Practice of …, 2012
82012
Using geographical information system for implementing resettlement strategies in mining areas in Kosovo
M Meha, B Rexha, I Shala, B Dragusha
WSEAS Transactions on Information Science and Applications 8 (1), 18-27, 2011
72011
Implementing data security in student lifecycle management system at the University of Prishtina
B Rexha, H Lajqi, M Limani
WSEAS Transactions on Information Science and Applications 7 (7), 965-974, 2010
72010
Enhancing burp suite with machine learning extension for vulnerability assessment of web applications
R Thaqi, K Vishi, B Rexha
Journal of Applied Security Research 18 (4), 789-807, 2023
62023
The teachers' impact on policy making for the improvement of the school performance (the case of Kosovo)
J Ferizi-Miftari, B Rexha
International Journal of Education Economics and Development 9 (1), 80-104, 2018
62018
Improving quality of election process using crowdsourcing techniques
B Rexha, I Murturi, I Shabani, A Rexhepi
International Journal of Applied Mathematics Electronics and Computers 4 (4), 2016
62016
Enhancing JWT Authentication and Authorization in Web Applications Based on User Behavior History
A Bucko, K Vishi, B Krasniqi, B Rexha
Computers 12 (4), 78, 2023
52023
Applying efficient crowdsourcing techniques for increasing quality and transparency of election processes
B Rexha, I Murturi
Electronic Government, an International Journal 15 (1), 107-128, 2019
52019
State of the art in privacy preservation in video data
S Aleksic, L Colonna, C Dantas, A Fedosov, F Florez-Revuelta, ...
Zenodo, 2022
42022
Analysis of Macro-Fem to Cellular Performance in LTE Under Various Transmission Power and Scheduling Schemes.
B Krasniqi, B Rexha
J. Commun. 13 (3), 119-123, 2018
42018
Efficiency of LSB and PVD Algorithms Used in Steganography Applications
B Rexha, P Rama, B Krasniqi, G Seferi
International Journal of Computer Engineering and Information Technology 10 …, 2018
42018
The system can't perform the operation now. Try again later.
Articles 1–20