Showing results 178 to 197 of 225
< previous
next >
Author(s) | Title | Issue Date | Appears in | Rank |
Tomović, Siniša ; Mihaljević, Miodrag J. ; Perović, Aleksandar; Ognjanović, Zoran | A Protocol for Provably Secure Authentication of a Tiny Entity to a High Performance Computing One | 1-Jan-2016 | Mathematical Problems in Engineering; 2016; 9289050:1-9289050:9 | M23 |
Mihaljević, Miodrag J. | Reconfigurable key management for broadcast encryption | 1-Jan-2004 | IEEE Communications Letters; 8(7); 440-442 | M21 |
Fossorier, Marc P. C.; Mihaljević, Miodrag J. ; Imai, Hideki | Reduced Complexity Iterative Decoding of Low Density Parity Check Codes Based on Belief Propagation | 1998 | ISITA '98 - 1998 IEEE Int. Symp. on Information Theory and Its Applications, Mexico, Mexico-City; 654-658 | M30 |
Fossorier, Marc P. C.; Mihaljević, Miodrag J. ; Imai, Hideki | Reduced complexity iterative decoding of low-density parity check codes based on belief propagation | 1-Jan-1999 | IEEE Transactions on Communications; 47(5); 673-680 | M21 |
Xu, Shujiang; Zhang, Lulu; Wang, Lianhai; Mihaljević, Miodrag J. ; Zhang, Shuhui; Shao, Wei; Wang, Qizheng | Relay network-based cross-chain data interaction protocol with integrity audit | 1-Jul-2024 | Computers and Electrical Engineering; 117; 109262 | ~M21 |
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, Hideki | Secret-public storage trade-off for broadcast encryption key management | 1-Dec-2004 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 3269; 375-387 | M23 |
Mihaljević, Miodrag J. | A security enhanced encryption scheme and evaluation of its cryptographic security | 1-Jul-2019 | Entropy : international and interdisciplinary journal of entropy and information studies; 21(7) | M21 |
Mihaljević, Miodrag J. ; Radonjić, Aleksandar; Wang, Lianhai; Xu, Shujiang | Security Enhanced Symmetric Key Encryption Employing an Integer Code for the Erasure Channel | 2022 | Symmetry; 14(8); 1709 | ~M22 |
Mihaljević, Miodrag J. ; Oggier, Frédérique | Security evaluation and design elements for a class of randomised encryptions | 1-Jan-2019 | IET Information Security; 13(1); 36-47 | M23 |
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, Hideki | Security Evaluation of Certain Broadcast Encryption Models Employing a Dedicated Time-Memory Trade-Off Approach | 2007 | HISC 2007 - Hawaii IEICE and SITA Joint Conference on Information Theory, Honolulu, US; 125-129 | M30 |
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, Hideki | Security evaluation of certain broadcast encryption schemes employing a generalized time-memory-data trade-off | 1-Dec-2007 | IEEE Communications Letters; 11(12); 988-990 | M22 |
Mihaljević, Miodrag J. ; Imai, Hideki | A security evaluation of certain stream ciphers which involve randomness and coding | 1-Dec-2010 | ISITA/ISSSTA 2010 - 2010 International Symposium on Information Theory and Its Applications; 20th International Symposium on Information Theory and Its Applications, ISITA 2010 and the 2010 20th International Symposium on Spread Spectrum Techniques and Applications, ISSSTA 2010; Taichung; Taiwan; 17 October 2010 through 20 October 2010; 789-794 | |
Tomović, Siniša ; Knežević, Milica ; Mihaljević, Miodrag J. ; Perović, Aleksandar; Ognjanović, Zoran | Security evaluation of NHB# authentication protocol against a MIM attack | 2016 | The IPSI BgD Transactions on Internet Research; 12(2); 22-36 | |
Mihaljević, Miodrag J. ; Watanabe, Hajime; Imai, Hideki | Security evaluation of stream ciphers | 2002 | Computer Today; 107; 4-10 | M50 |
Matsui, Mitsuru; Mihaljević, Miodrag J. | Security Evaluation Techniques for Symmetric Cryptography | 2004 | Information Security Handbook; 145-160 | M14 |
Mihaljević, Miodrag J. | Security examination of a cellular automata based pseudorandom bit generator using an algebraic replica approach | 1-Jan-1997 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 1255; 250-262 | M23 |
Michael, Lachlan B.; Mihaljević, Miodrag J. ; Haruyama, Shinichiro; Kohno, Ryuji | Security issues for software defined radio: Design of a secure download system | 1-Jan-2003 | IEICE Transactions on Communications; E85-B(12); 2588-2600 | M22 |
Mihaljević, Miodrag J. ; Imai, Hideki | Security Issues of Cloud Computing and an Encryption Approach | 2014 | Handbook of Research on High Performance and Cloud Computing in Scientific Research and Education; 388-408 | M14 |
Mihaljević, Miodrag J. ; Imai, Hideki | Security issues of cloud computing and an encryption approach | 31-Oct-2014 | Cloud Technology: Concepts, Methodologies, Tools, and Applications; 3; 1527-1547 | |
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, Hideki | Security weaknesses of certain broadcast encryption schemes | 1-Jan-2006 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 3919 LNCS; 228-245 | M23 |