Showing results 106 to 125 of 225
< previous
next >
Author(s) | Title | Issue Date | Appears in | Rank |
Mihaljević, Miodrag J. ; Stijović, D.; Marić, B.; Popadić, S.; Ivanović, M. | Koncept za uporedjivanje i uporedni pregled tri tehnike za za stitu informacionih sistema: Kerberos, SESAME i SSH | 1999 | Info-Science; 7(6); 8-13 | M50 |
Mihaljević, Miodrag J. ; Knežević, Milica | Kontrola pristupa podacima primenom blokčejn i broadcast encryption tehnika | 2020 | | M80 |
Abe, Masayuki; Aoki, Kazumaro; Ateniese, Giuseppe; Avanzi, Roberto; Beerliová, Zuzana; Billet, Olivier; Biryukov, Alex; Blake, Ian; Boyd, Colin; Brier, Eric; Castiglione, Aniello; Cha, Juyoung; Chan, Aldar; Chen, Liqun; Cho, Kookrae; Contini, Scott; D'Arco, Paolo; Ding, Jintai; Doche, Christophe; Dunkelman, Orr; Fitzi, Matthias; Fouque, Pierre Alain; Fournier, Jacques J.A.; Fujisaki, Kouichi; Fujisaki, Eiichiro; Furukawa, Jun; Galindo, David; Halevi, Shai; Handschuh, Helena; Heneghan, Chris; Holenstein, Thomas; Hoshino, Fumitaka; Hwang, Yong Ho; Isshiki, Toshiyuki; Jochemsz, Ellen; Joux, Antoine; Juels, Ari; Jutla, Charanjit; Kiayias, Aggelos; Kikuchi, Hiroaki; Kobayashi, Tetsutarou; Kohno, Tadayoshi; Krawczyk, Hugo; Kumar, Sandeep; Lange, Tanja; Lee, Jung Wook; Masucci, Barbara; May, Alexander; Mihaljević, Miodrag J. ; Minematsu, Kazuhiko; Monrose, Fabian; Montague, Paul; Myers, Steve; Naccache, David; Nicolosi, Antonio; Obana, Satoshi; Okazaki, Satomi; Okeya, Katsuyuki; Olivier, Francis; Oyono, Roger; Page, Dan; Park, Jung Hyung; Peng, Kun; Pietrzak, Krzysztof; Raub, Dominik; Sakai, Yasuyuki; Sakurai, Kouichi; Schindler, Werner; Seo, Jae Woo; Shin, Jong Hoon; Shparlinski, Igor; Steinfeld, Ron; Szydlo, Mike; Kalai, Yael Tauman; Teranishi, Isamu; Tokita, Toshio; Tunstall, Michael; Vercauteren, Frederik; Villegas, Karine; Walfish, Shabsi; Wang, Huaxiong; Wang, Xiaofeng; Warinschi, Bogdan; De Weger, Benne; Wolf, Christopher; Yampolskiy, Alex; Yang, Yeon Hyeong; Yin, Yiqun Lisa; Yoon, Jeong; Pointcheval, David | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface | 6-Jul-2006 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); CT-RSA 2006: The Cryptographers' Track at the RSA Conference 2006; 3960 LNCS | |
Mihaljević, Miodrag J. | Light-Weight and Provable Secure Cryptographic Techniques - The Key Components for Cyber Security and Efficient Smart Grid Deployment | 2013 | Global Wireless Summit (GSW) 2013, Atlantic City, US; 141-142 | M30 |
Kavčić, Aleksandar; Mihaljević, Miodrag J. ; Matsuura, Kanta | Light-weight secrecy system using channels with insertion errors: Cryptographic implications | 17-Dec-2015 | ITW 2015 - 2015 IEEE Information Theory Workshop; IEEE Information Theory Workshop, ITW 2015; Lotte City Hotel JejuJeju Island; South Korea; 11 October 2015 through 15 October 2015; 257-261 | |
Davidović, Tatjana ; Nives Radović, A.; Mihaljević, Miodrag J. ; Todorović, Milan ; Jelić, S. | Literature Review on the application of Blockchain Technology in Maritime Supply Chain Systems | 2022 | 2nd Kotor International Maritime Conference, Kotor, Montenegro, Nov. 27-30, 2022; Book of Abstracts; 37 | M34 |
Mihaljević, Miodrag J. ; Watanabe, Hajime; Imai, Hideki | A low complexity authentication protocol based on pseudorandomness, randomness and homophonic coding | 1-Dec-2010 | ISITA/ISSSTA 2010 - 2010 International Symposium on Information Theory and Its Applications; 690-695 | |
Mihaljević, Miodrag J. ; Watanabe, Hajime; Imai, Hideki | A Low Complexity Authentication Technique Based on Binary Channel with Deletion, Insertion and Complementing | 2007 | HISC 2007 - Hawaii IEICE and SITA Joint Conference on Information Theory, Honolulu, US; 95-100 | M30 |
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, Hideki | A Low-Complexity and High-Performance algorithm for the fast correlation attack | 1-Jan-2001 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 1978; 196-212 | M21 |
Mihaljević, Miodrag J. | The LPN Problem, Authentication Protocol and Man-in-the-Middle Attack | 21-Jun-2021 | Invited seminar talk at Indian Statistical Institute, R.G. Bose Centre for Cryptology&Security | |
Zhang, Shuhui; Hu, Changdong; Wang, Lianhai; Mihaljević, Miodrag J. ; Xu, Shujiang; Lan, Tian | A Malware Detection Approach Based on Deep Learning and Memory Forensics | 2023 | Symmetry; 15(3); 758 | ~M22 |
Knežević, Milica ; Tomović, Siniša ; Mihaljević, Miodrag J. | Man-In-The-Middle Attack against Certain Authentication Protocols Revisited: Insights into the Approach and Performances Re-Evaluation | 12-Aug-2020 | Electronics; 9(8); 1-23 | M22 |
Mihaljević, Miodrag J. ; Abe, Jouji | Method and apparatus for cellular automata based generation of pseudorandom sequences with controllable period | 2011 | | M91 |
Morelos-Zaragoza, Robert; Mihaljević, Miodrag J. | Method and apparatus for loss correction and limited reception in streaming data, and data communication apparatus | 2007 | | M91 |
Mihaljević, Miodrag J. ; Golić, Jovan Dj. | A method for convergence analysis of iterative probabilistic decoding | 1-Jan-2000 | IEEE Transactions on Information Theory; 46(6); 2206-2211 | M22 |
Korać, Vanja ; Todorović, Milan ; Mihaljević, Miodrag J. | Metod i realizacija inicijalne zaštite bibliometrijskog sistema Ministarstva prosvete, nauke i tehnološkog razvoja | 2017 | | M85 |
Mihaljević, Miodrag J. ; Knežević, Milica ; Jelisavčić, Vladisav ; Zdravković, Aleksandra | Metod i softer za napredne tehnike za zaštitu tajnosti/privatnosti u domenu IoT i M2M | 2016 | | M85 |
Urošević, Dragan ; Mihaljević, Miodrag J. ; Knežević, Milica | Metod i softver za blokčejn zasnovanu kontrolu integriteta podataka u udaljenim skladištima | 2018 | | M85 |
Mihaljević, Miodrag J. ; Arsić, Aleksandra | Metod i softver za jednosmernu funkciju u klasi konsenzus protokola za blokčejn tehnologiju | 2018 | | M85 |
Mihaljević, Miodrag J. ; Knežević, Milica ; Tomović, Siniša | Metod i softver za napredne tehnike za autentikaciju u domenu Cloud i Big Data | 2017 | | M85 |