Ljupcho Antovski

Learn More
The anonymous channels have been the essence of numerous protocols that include anonymous message passing between peers. The mixnet structure is one way to accomplish the anonymity. Since the publication of the Chaumian mixnet, there have been many practical implementations. There are two main approaches to implement mixnets: the decryption (Chaumian) and(More)
The E-Government services in Macedonia are using the standard username-password authentication. This process is weak and susceptible to various stealing and reusing passwords. In this paper we propose implementation of two-factor authorization. This implementation is based on One-time password algorithm which would solve the basic weakness of the standard(More)
Clients expect that enterprise software systems, which are continually growing in complexity, are of high quality, with reasonable price and have a short time to market. To find ways to meet with the increasing demands of business, software engineers are forced to find ways to streamline development process. Software reuse is believed to be one such(More)
This paper proposes a new risk management framework tailored for IT-centric micro and small companies based on the analysis of the best practices in risk management concepts, specifically the risk management frameworks. The proposed framework for risk management is a synergy of various elements from the existing frameworks, tailored to the specifics of the(More)
There is a lack of published research data on the goal conversions of the real e-commerce systems and e-commerce users' behavior in Macedonia and the Balkan countries. We present the findings of the 6 months research on the strategies applied on the regional e-commerce online bookstore Kupikniga.mk. and recommendations. Based on the analytical data from(More)
Elliptic curves are gaining momentum as scientists are continuously proving their security and performance. Pairings over elliptic curves are relatively new in the world of cryptography. Researchers are coming with new cryptographic usage of pairings for over ten years. ID-based cryptography is also gaining popularity because of the certificate-less mode of(More)