Browsing by Author Mihaljević, Miodrag J.


Or, select a letter below to browse by last name
0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 170 to 189 of 222 < previous   next >
Author(s)TitleIssue DateAppears inRank
Mihaljević, Miodrag J. On vulnerabilities and improvements of fast encryption algorithm for multimedia FEA-M1-Jan-2003IEEE Transactions on Consumer Electronics; 49(4); 1199-1207M22
Mihaljević, Miodrag J. ; Kohno, RyujiOn wireless communications privacy and security evaluation of encryption techniques1-Jan-2002IEEE Wireless Communications and Networking Conference, WCNC; 2; 865-868
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, HidekiOne-way mapping of keys and the overheads trade-off in key management schemes for broadcast encryption2004Int. Symp. Inform. Theory and its Appl. - ISITA2004, Parma, Italy; 486-491M30
Mihaljević, Miodrag J. ; Tomović, Siniša ; Knežević, Milica Performance Evaluation of an Advanced Man-in-the-Middle Attack Against Certain HB Authentication Protocols20172nd CRYPTACUS Workshop, Radboud University, Nijmegen, The NetherlandsM30
Mihaljević, Miodrag J. Prikaz opšteg standardizovanog okvira za ostvarivanje informatičke bezbednosti Elektronskog Registra u njegovom integralnom okruženju - Projekat razvoja i implementacije savremenog eletronskog registra u Republičkoj direkciji za imovinu2008M80
Mihaljević, Miodrag J. ; Imai, HidekiPrivacy Preserving Light-Weight Authentication Based on a Variant of Niederreiter Public-Key Encryption2015The IPSI BgD Transactions on Advanced Research; 11(1); 6-12M53
Mihaljević, Miodrag J. Privatnost u digitalnom dobu: Iluzija ili nacionalni izazov2017M66
Michael, Lachlan B.; Mihaljević, Miodrag J. ; Haruyama, Shinichiro; Kohno, RyujiA proposal of architectural, elements for implementing secure software download service in software defined radio1-Dec-2002IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC; 1; 442-446
Tomović, Siniša ; Mihaljević, Miodrag J. ; Perović, Aleksandar; Ognjanović, Zoran A Protocol for Provably Secure Authentication of a Tiny Entity to a High Performance Computing One1-Jan-2016Mathematical Problems in Engineering; 2016; 9289050:1-9289050:9M23
Mihaljević, Miodrag J. Reconfigurable key management for broadcast encryption1-Jan-2004IEEE Communications Letters; 8(7); 440-442M21
Fossorier, Marc P. C.; Mihaljević, Miodrag J. ; Imai, HidekiReduced Complexity Iterative Decoding of Low Density Parity Check Codes Based on Belief Propagation1998ISITA '98 - 1998 IEEE Int. Symp. on Information Theory and Its Applications, Mexico, Mexico-City; 654-658M30
Fossorier, Marc P. C.; Mihaljević, Miodrag J. ; Imai, HidekiReduced complexity iterative decoding of low-density parity check codes based on belief propagation1-Jan-1999IEEE Transactions on Communications; 47(5); 673-680M21
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, HidekiSecret-public storage trade-off for broadcast encryption key management1-Dec-2004Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 3269; 375-387M23
Mihaljević, Miodrag J. A security enhanced encryption scheme and evaluation of its cryptographic security1-Jul-2019Entropy : international and interdisciplinary journal of entropy and information studies; 21(7)M21
Mihaljević, Miodrag J. ; Radonjić, Aleksandar; Wang, Lianhai; Xu, ShujiangSecurity Enhanced Symmetric Key Encryption Employing an Integer Code for the Erasure Channel2022Symmetry; 14(8); 1709~M22
Mihaljević, Miodrag J. ; Oggier, FrédériqueSecurity evaluation and design elements for a class of randomised encryptions1-Jan-2019IET Information Security; 13(1); 36-47M23
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, HidekiSecurity Evaluation of Certain Broadcast Encryption Models Employing a Dedicated Time-Memory Trade-Off Approach2007HISC 2007 - Hawaii IEICE and SITA Joint Conference on Information Theory, Honolulu, US; 125-129M30
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, HidekiSecurity evaluation of certain broadcast encryption schemes employing a generalized time-memory-data trade-off1-Dec-2007IEEE Communications Letters; 11(12); 988-990M22
Mihaljević, Miodrag J. ; Imai, HidekiA security evaluation of certain stream ciphers which involve randomness and coding1-Dec-2010ISITA/ISSSTA 2010 - 2010 International Symposium on Information Theory and Its Applications; 20th International Symposium on Information Theory and Its Applications, ISITA 2010 and the 2010 20th International Symposium on Spread Spectrum Techniques and Applications, ISSSTA 2010; Taichung; Taiwan; 17 October 2010 through 20 October 2010; 789-794
Tomović, Siniša ; Knežević, Milica ; Mihaljević, Miodrag J. ; Perović, Aleksandar; Ognjanović, Zoran Security evaluation of NHB# authentication protocol against a MIM attack2016The IPSI BgD Transactions on Internet Research; 12(2); 22-36