Browsing by Author Mihaljević, Miodrag J.

Or, select a letter below to browse by last name
0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 128 to 147 of 191 < previous   next >
Author(s)TitleIssue DateAppears inRank
Mihaljević, Miodrag J. O blokčejn tehnologiji i njenim primenama: Bitkoin, Blokčejn Tehnologija i Kriptografija - Predavanje po pozivu4-Mar-2020M60
Mihaljević, Miodrag J. ; Kohno, RyujiOn a framework for employment of cryptographic components in software defined radio1-Jan-2002International Symposium on Wireless Personal Multimedia Communications, WPMC; 2; 835-839
Mihaljević, Miodrag J. ; Imai, Hideki; David, Michael; Kobara, Kazukuni; Watanabe, HajimeOn advanced cryptographic techniques for information security of smart grid AMI1-Dec-2011ACM International Conference Proceeding Series; 7th Annual Cyber Security and Information Intelligence Research Workshop: Energy Infrastructure Cyber Protection, CSIIRW11; Oak Ridge, TN; United States; 12 October 2011 through 14 October 2011
Mihaljević, Miodrag J. On Advanced Techniques for Blockchain Technology and Some Applications2021E-business technologies (EBT) Conference, Faculty of Organizational Sciences, Belgrade, 10-11 June 2021M32
Mihaljević, Miodrag J. On Blockchain Technology and Some Applications21-Oct-2020Webinar, Mathematics is for Human Flourishing in the Time of COVID-19 and POST COVID-19; Abstract Booklet; 12
Mihaljević, Miodrag J. On Blockchain Technology and the Consensus Protocol24-Nov-2020
Mihaljević, Miodrag J. On Certain Approaches for Analysis and Design of Cryptographic Techniques for Symmetric Encryption and Key Management2012Selected Topics of Image Processing and Cryptology; 15; 119-186M14
Mihaljević, Miodrag J. On Certain Challenges of Blockchain Technology Deployment2018ETRAN (IcETRAN) 2018, 5th International Conference on Electrical, Electronic and Computing EngineeringM30
Mihaljević, Miodrag J. On Certain Coding Approaches for Security Evaluation and Design of Stream Ciphers2012The IPSI BgD Transactions on Advanced Research; 8(2); 28-34M53
Mihaljević, Miodrag J. ; Marković, Zoran On cryptographic approaches for security of information technologies2000Facta universitatis, Series: Mechanics, Automatic Control and Robotics; 2(10); 1393-1402M50
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, HidekiOn decoding techniques for cryptanalysis of certain encryption algorithms1-Jan-2001IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences; E84-A(4); 919-930M23
Mihaljević, Miodrag J. ; Imai, HidekiOn employment of different weight parity-checks for the fast correlation attack1-Jan-2001IEEE International Symposium on Information Theory - Proceedings; IEEE International Symposium on Information Theory (ISIT 2001); Washington, DC; United States; 24 June 2001 through 29 June 2001; 119M23
Mihaljević, Miodrag J. ; Imai, HidekiOn Employment of Homophonic Coding for Improvement of Certain Encryption Approaches Based on the LPN Problem20112011 Symmetric Key Encryption Workshop - SKEW 2011, Copenhagen, Denmark; 1-17M30
Camion, Paul; Mihaljević, Miodrag J. ; Imai, HidekiOn employment of LFSRs over GF(q) in certain stream ciphers1-Jan-2002IEEE International Symposium on Information Theory - Proceedings; 210
Mihaljević, Miodrag J. On message protection in cryptosystems modelled as the generalized wire-tap channel II1-Jan-1994Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 829 LNCS; 13-24M23
Mihaljević, Miodrag J. ; Matsuura, KantaOn the Consensus Protocols for Public Blockchains2019Interop Tokyo 2019M30
Mihaljević, Miodrag J. On vulnerabilities and improvements of fast encryption algorithm for multimedia FEA-M1-Jan-2003IEEE Transactions on Consumer Electronics; 49(4); 1199-1207M22
Mihaljević, Miodrag J. ; Kohno, RyujiOn wireless communications privacy and security evaluation of encryption techniques1-Jan-2002IEEE Wireless Communications and Networking Conference, WCNC; 2; 865-868
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, HidekiOne-way mapping of keys and the overheads trade-off in key management schemes for broadcast encryption2004Int. Symp. Inform. Theory and its Appl. - ISITA2004, Parma, Italy; 486-491M30
Mihaljević, Miodrag J. ; Tomović, Siniša ; Knežević, Milica Performance Evaluation of an Advanced Man-in-the-Middle Attack Against Certain HB Authentication Protocols20172nd CRYPTACUS Workshop, Radboud University, Nijmegen, The NetherlandsM30