Browsing by Author Mihaljević, Miodrag J.


Or, select a letter below to browse by last name
0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 210 to 224 of 224 < previous 
Author(s)TitleIssue DateAppears inRank
Mihaljević, Miodrag J. Tehnički izveštaj o evaluaciji kriptografske sigurnosti DocuCrypt rešenja2007M80
Mihaljević, Miodrag J. Tehnički izveštaj o evaluaciji kriptografske sigurnosti i redizajniranom CashTeleport rešenju2007M80
Mihaljević, Miodrag J. ; Marković, Zoran ; Davidović, Tatjana Tehnički izveštaj o evaluaciji kriptografske sigurnosti određenih kriptografskih tehnika od perspektivnog interesa za GSM mrežu Mobilne telefonije, Telekoma Srbije2008M80
Mihaljević, Miodrag J. ; Marković, Zoran ; Ognjanović, Zoran Tehnički izveštaj o evaluaciji kriptografske sigurnosti tehnika za zaštitu govornog servisa Mobilne telefonije, Telekoma Srbije2007M80
Mihaljević, Miodrag J. ; Marković, Zoran ; Ognjanović, Zoran Tehnički izveštaj o evaluaciji kriptografske sigurnosti tehnika za zaštitu negovornih servisa Mobilne telefonije, Telekoma Srbije2007M80
Tomović, Siniša ; Mihaljević, Miodrag J. ; Knežević, Milica The Success Rate Reconsideration of the MIM Attack Against HB# Authentication Protocols2017COST Cryptanalysis of Ubiquitous Computing Systems (CRYPTACUS) Workshop, Sutomore, Montenegro; 110-145M30
Fossorier, Marc P. C.; Mihaljević, Miodrag J. ; Imai, HidekiTime-Memory and Time-Memory-Data Trade-Off for Noisy Ciphertext2010ECRYPT Workshop on Tools for Cryptanalysis 2010; 27-36M30
Mihaljević, Miodrag J. ; Imai, HidekiTowards Lightweight Cryptographic Primitives Employing Coding Theory2013BalkanCrypt 2013
Xu, S.; Wang, F.; Mihaljević, Miodrag J. ; Zhang, S.; Shao, W.; Huang, Q.Trusted Auditing of Data Operation Behaviors in Cloud based on Blockchain and TEE2023IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking, Dec. 21-24 Dec 2023; Proceedings; 447-455M33
Camion, Paul; Mihaljević, Miodrag J. ; Imai, HidekiTwo alerts for design of certain stream ciphers: Trapped LFSR and weak resilient function over GF(q)1-Dec-2003Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 2595; 196-213M23
Fossorier, Marc P. C.; Mihaljević, Miodrag J. ; Imai, HidekiA unified analysis for the fast correlation attack1-Jan-2005IEEE International Symposium on Information Theory - Proceedings; 2005; 2012-2015
Camion, P.; Mihaljević, Miodrag J. ; Imai, HidekiVulnerability of certain keystream generators based on resilient functions2000ISITA2000, Hawaii, USA; 70-73M30
Mihaljević, Miodrag J. ; Oggier, FrédériqueWire-tap Approach to enhance security in communication systems using the encoding-encryption paradigm19-Jul-2010ICT 2010: 2010 17th International Conference on Telecommunications, 4-7 April 2010; 83-88
Lachlan, Michael; Mihaljević, Miodrag J. Wireless data communication method and apparatus for software download system2009M91
Mihaljević, Miodrag J. Приказ остварења Математичког института САНУ у домену дигиталне приватности/безбедности и илустративни примери2017Privatnost u digitalnom dobu: Iluzija ili nacionalni izazovM62