Loading... 3 0 20 0 false
Full Name
Mihaljević, Miodrag J.
Scopus Author ID
Country
Serbia
Loading... 2 0 20 0 false


Results 141-160 of 222 (Search time: 0.006 seconds).

Author(s)TitleIssue DateAppears inRank
141Mihaljević, Miodrag J. ; Marković, Zoran ; Ognjanović, Zoran Tehnički izveštaj o evaluaciji kriptografske sigurnosti tehnika za zaštitu govornog servisa Mobilne telefonije, Telekoma Srbije2007M80
142Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, HidekiSecurity Evaluation of Certain Broadcast Encryption Models Employing a Dedicated Time-Memory Trade-Off Approach2007HISC 2007 - Hawaii IEICE and SITA Joint Conference on Information Theory, Honolulu, US; 125-129M30
143Mihaljević, Miodrag J. ; Watanabe, Hajime; Imai, HidekiA Low Complexity Authentication Technique Based on Binary Channel with Deletion, Insertion and Complementing2007HISC 2007 - Hawaii IEICE and SITA Joint Conference on Information Theory, Honolulu, US; 95-100M30
144Mihaljević, Miodrag J. Tehnički izveštaj o evaluaciji kriptografske sigurnosti i redizajniranom CashTeleport rešenju2007M80
145Mihaljević, Miodrag J. Tehnički izveštaj o evaluaciji kriptografske sigurnosti DocuCrypt rešenja2007M80
146Abe, Masayuki; Aoki, Kazumaro; Ateniese, Giuseppe; Avanzi, Roberto; Beerliová, Zuzana; Billet, Olivier; Biryukov, Alex; Blake, Ian; Boyd, Colin; Brier, Eric; Castiglione, Aniello; Cha, Juyoung; Chan, Aldar; Chen, Liqun; Cho, Kookrae; Contini, Scott; D'Arco, Paolo; Ding, Jintai; Doche, Christophe; Dunkelman, Orr; Fitzi, Matthias; Fouque, Pierre Alain; Fournier, Jacques J.A.; Fujisaki, Kouichi; Fujisaki, Eiichiro; Furukawa, Jun; Galindo, David; Halevi, Shai; Handschuh, Helena; Heneghan, Chris; Holenstein, Thomas; Hoshino, Fumitaka; Hwang, Yong Ho; Isshiki, Toshiyuki; Jochemsz, Ellen; Joux, Antoine; Juels, Ari; Jutla, Charanjit; Kiayias, Aggelos; Kikuchi, Hiroaki; Kobayashi, Tetsutarou; Kohno, Tadayoshi; Krawczyk, Hugo; Kumar, Sandeep; Lange, Tanja; Lee, Jung Wook; Masucci, Barbara; May, Alexander; Mihaljević, Miodrag J. ; Minematsu, Kazuhiko; Monrose, Fabian; Montague, Paul; Myers, Steve; Naccache, David; Nicolosi, Antonio; Obana, Satoshi; Okazaki, Satomi; Okeya, Katsuyuki; Olivier, Francis; Oyono, Roger; Page, Dan; Park, Jung Hyung; Peng, Kun; Pietrzak, Krzysztof; Raub, Dominik; Sakai, Yasuyuki; Sakurai, Kouichi; Schindler, Werner; Seo, Jae Woo; Shin, Jong Hoon; Shparlinski, Igor; Steinfeld, Ron; Szydlo, Mike; Kalai, Yael Tauman; Teranishi, Isamu; Tokita, Toshio; Tunstall, Michael; Vercauteren, Frederik; Villegas, Karine; Walfish, Shabsi; Wang, Huaxiong; Wang, Xiaofeng; Warinschi, Bogdan; De Weger, Benne; Wolf, Christopher; Yampolskiy, Alex; Yang, Yeon Hyeong; Yin, Yiqun Lisa; Yoon, Jeong; Pointcheval, DavidLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface6-Jul-2006Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); CT-RSA 2006: The Cryptographers' Track at the RSA Conference 2006; 3960 LNCS
147Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, HidekiA general formulation of algebraic and fast correlation attacks based on dedicated sample decimation1-Jan-2006Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 3857 LNCS; 203-214M23
148Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, HidekiA novel broadcast encryption based on time-bound cryptographic keys1-Jan-2006Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); International Conference on Digital Rights Management, DRMTICS 2005 : Digital Rights Management. Technologies, Issues, Challenges and Systems; Sydney, Australia; October 31 - November 2, 2005; 3919 LNCS; 258-276M23
149Fossorier, Marc P. C.; Mihaljević, Miodrag J. ; Imai, Hideki; Cui, Yang; Matsuura, KantaAn algorithm for solving the LPN problem and its application to security evaluation of the HB protocols for RFID authentication1-Jan-2006Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 4329 LNCS; 48-62M23
150Wang, Jian; Mihaljević, Miodrag J. ; Harn, Lein; Imai, HidekiA hierarchical key management approach for secure multicast1-Jan-2006Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 3894 LNCS; 422-434M23
151Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, HidekiSecurity weaknesses of certain broadcast encryption schemes1-Jan-2006Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 3919 LNCS; 228-245M23
152Mihaljević, Miodrag J. ; Marković, M.; Mijajlović, Z.Izveštaj o bezbednosnim karakteristikama Digitrust PKI rešenja2006M80
153Mihaljević, Miodrag J. ; Marković, M.; Marković, Zoran ; Ognjanović, Zoran ; Perišić, Z.; Marinković, Bojan ; Korać, Vanja Metodološke, organizacione i normativne komponente za sistem upravljanja bezbednošću informacija u Telekomu Srbija2006M80
154Mihaljević, Miodrag J. ; Marković, M.Elaborat o analizi postojećih i mogućnosti implementacije usavršenih i novih za štitnih mehanizama u FIX protokolu2006M80
155Mihaljević, Miodrag J. ; Imai, HidekiNovel method for implementation of certain key management schemes to minimize secret storage1-Jan-20052005 2nd IEEE Consumer Communications and Networking Conference, CCNC2005; 2005; 54-59
156Fossorier, Marc P. C.; Mihaljević, Miodrag J. ; Imai, HidekiA unified analysis for the fast correlation attack1-Jan-2005IEEE International Symposium on Information Theory - Proceedings; 2005; 2012-2015
157Mihaljević, Miodrag J. ; Imai, HidekiThe decimated sample based improved algebraic attacks on the nonlinear filters1-Jan-2005Lecture Notes in Computer Science; 3352; 310-323M23
158Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, HidekiKey management with minimized secret storage employing an erasure channel approach1-Jan-2005IEEE Communications Letters; 9(8); 741-743M21
159Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, HidekiCryptanalysis of keystream generator by decimated sample based algebraic and fast correlation attacks1-Jan-2005Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 3797 LNCS; 155-168M23
160Fossorier, Marc P. C.; Mihaljević, Miodrag J. ; Imai, HidekiA Novel Broadcast Encryption Based on Time-Bound Cryptographic Keys2005HISC 2005 - Hawaii, IEICE and SITA Joint Conference on Information Theory, Hawaii, USA; 183-188M30

Projects



Results 1-6 of 6 (Search time: 0.001 seconds).

AcronymTitleStart dateCompletionP-Investigator
A decentralized blockchain platform for reading, writing, publishing, selling and buying e-books01-07-202030-06-2022Mihaljević, Miodrag J.
PROJECT 0274A Software System For Cryptographic Protection of the Electronic Archives01-01-200231-12-2004Mihaljević, Miodrag J.
PROJECT 1625Advanced Mathematical Methods for Cryptographic Security and Modelling of Information01-01-200231-12-2005Mihaljević, Miodrag J.
PROJECT 144018Advanced methods for cryptology and information processing01-01-200631-12-2010Mihaljević, Miodrag J.
PROJECT 174008Advanced Techniques of Cryptology, Image Processing and Computational Topology for Information Security01-01-201131-12-2019Mihaljević, Miodrag J.
PROJECT 04M02Mathematical Logic, Combinatorics and Information Processing: Foundations and Applications of Computer Science01-01-199631-12-2000Mihaljević, Miodrag J.