Ljupcho Antovski

Learn More
The anonymous channels have been the essence of numerous protocols that include anonymous message passing between peers. The mixnet structure is one way to accomplish the anonymity. Since the publication of the Chaumian mixnet, there have been many practical implementations. There are two main approaches to implement mixnets: the decryption (Chaumian) and(More)
High-quality software, delivered on time and budget, constitutes a critical part of most products and services. Today software engineers are faced with a demand for complex and powerful software systems. To be competitive in the market software engineers are forced to create software as quickly as possible. Software reuse or component-based development(More)
The E-Government services in Macedonia are using the standard username-password authentication. This process is weak and susceptible to various stealing and reusing passwords. In this paper we propose implementation of two-factor authorization. This implementation is based on One-time password algorithm which would solve the basic weakness of the standard(More)
Clients expect that enterprise software systems, which are continually growing in complexity, are of high quality, with reasonable price and have a short time to market. To find ways to meet with the increasing demands of business, software engineers are forced to find ways to streamline development process. Software reuse is believed to be one such(More)
There is a lack of published research data on the goal conversions of the real e-commerce systems and e-commerce users' behavior in Macedonia and the Balkan countries. We present the findings of the 6 months research on the strategies applied on the regional e-commerce online bookstore Kupikniga.mk. and recommendations. Based on the analytical data from(More)
Due to the arising problems with using static passwords, there is a strong need of implementing more secure protocols for authentication. The One-Time Password protocol is implementation for two-factor authentication; the two factors being something you own (a token) and something you know (PIN). This paper presents an open algorithm for OTP and implements(More)
  • 1