Browsing by Author Mihaljević, Miodrag J.


Or, select a letter below to browse by last name
0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 21 to 40 of 191 < previous   next >
Author(s)TitleIssue DateAppears inRank
Tomović, Siniša ; Knežević, Milica ; Mihaljević, Miodrag J. Analysis and Correction of the Attack against the LPN-Problem Based Authentication Protocols8-Mar-2021Mathematics; 9(5); 573~M21a
Imai, Hideki; Mihaljević, Miodrag J. ; Isaka, M.; Fossorier, Marc P. C.Applications of iterative decoding techniques to cryptography20002nd Int. Symp. on Turbo Codes & Related Topics, Brest, France; 227-234M30
Mihaljević, Miodrag J. ; Knežević, Milica ; Urošević, Dragan ; Wang, Lianhai; Xu, ShujiangAn Approach for Blockchain and Symmetric Keys Broadcast Encryption Based Access Control in IoT2023Symmetry; 15(2); 299~M22
Mihaljević, Miodrag J. ; Wang, Lianhai; Xu, Shujiang; Todorović, Milan An Approach for Blockchain Pool Mining Employing the Consensus Protocol Robust against Block Withholding and Selfish Mining Attacks2022Symmetry; 14(8); 1711~M22
Mihaljević, Miodrag J. An Approach for Blockchain Pool Mininig Resistant Against Certain Attacks, Keynote Talk at IEM‐ICDC 20212021International Conference on Computational Intelligence, Data Science and Cloud Computing, Kolkata, India, December 22‐23, 2021M31
Mihaljević, Miodrag J. An Approach for BlockchainPool Mininig Resistant Against Certain Attacks - Keynote Talk2021IEM‐ICDC 2021, International Conference on Computational Intelligence, Data Science and Cloud Computing, Institute of Engineering & Management, Kolkata, India, December 22‐23, 2021.M32
Mihaljević, Miodrag J. An approach for light-weight encryption employing dedicated coding1-Dec-2012GLOBECOM - IEEE Global Telecommunications Conference; IEEE Global Communications Conference, GLOBECOM 2012; Anaheim, CA; United States; 3 December 2012 through 7 December 2012; 874-880
Mihaljević, Miodrag J. ; Wang, Lianhai; Xu, ShujiangAn Approach for Security Enhancement of Certain Encryption Schemes Employing Error Correction Coding and Simulated Synchronization Errors2022Entropy; 24(3); 406~M22
Mihaljević, Miodrag J. ; Imai, HidekiAn approach for stream ciphers design based on joint computing over random and secret data1-Jun-2009Computing; 85(1-2); 153-168M22
Mihaljević, Miodrag J. An approach to the initial state reconstruction of a clock-controlled shift register based on a novel distance measure1-Jan-1993Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 718 LNCS; 349-356M23
Mihaljević, Miodrag J. ; Matsuura, K.Authentication System and Method2019M91
Mihaljević, Miodrag J. ; Watanabe, HajimeAuthentication system using light-weight authentication protocol2011M91
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, HidekiBirthday paradox based security analysis of certain broadcast encryption schemes1-Jan-2007IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences; E90-A(6); 1248-1251M23
Mihaljević, Miodrag J. Bitcoin, Blockchain Technology and Cryptography - An Illustration of Certain Issues2020Anali ogranka SANU u Novom Sadu; 41-47
Mihaljević, Miodrag J. A Blockchain Consensus Protocol Based on Dedicated Time-Memory-Data Trade-Off30-Jul-2020IEEE Access; 8; 141258-141268M21
Mihaljević, Miodrag J. A Blockchain Consensus Protocol with Flexible Requirement of the Resources202014th International Online Conference on Mathematical Scences for Advancement of Science and Technology, December 21-23, IndiaM30
Mihaljević, Miodrag J. Broadcast encryption schemes based on the sectioned key tree1-Dec-2003Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 2836; 158-169M23
Mileva, Aleksandra; Dimitrova, Vesna; Kara, Orhun; Mihaljević, Miodrag J. Catalog and Illustrative Examples on Lightweight Cryptographic Primitives2021Security of Ubiquitous Computing Systems; 21-47M14
Mihaljević, Miodrag J. ; Watanabe, Hajime; Imai, HidekiA cellular automata based HB#-like low complexity authentication technique1-Dec-20082008 International Symposium on Information Theory and its Applications, ISITA2008, 7-10 Dec. 2008
Mihaljević, Miodrag J. ; Zheng, Yuliang; Imal, HidekiA cellular automaton based fast one-way hash function suitable for hardware implementation1-Jan-1998Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 1431; 217-233M23