Showing results 99 to 118 of 233
< previous
next >
Author(s) | Title | Issue Date | Appears in | Rank |
Mihaljević, Miodrag J. ; Gangopadhyay, Sugata; Paul, Goutam; Imai, Hideki | Internal state recovery of Grain-v1 employing normality order of the filter function | 1-Jun-2012 | IET Information Security; 6(2); 55-64 | M23 |
Mihaljević, Miodrag J. ; Gangopadhyay, Sugata; Paul, Goutam; Imai, Hideki | Internal state recovery of keystream generator LILI-128 based on a novel weakness of the employed Boolean function | 15-Nov-2012 | Information Processing Letters; 112(21); 805-810 | M23 |
Mihaljević, Miodrag J. | An iterative probabilistic decoding algorithm for binary linear block codes beyond the half minimum distance | 1-Jan-1997 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 1255; 237-249 | M23 |
Mihaljević, Miodrag J. ; Marinković, Bojan ; Zdravković, Aleksandra; Vujošević, Sandra | Izgradnja osnova za kastomizovanu informaciono-komunikacionu infrastrukturu za pametna električna brojila | 2016 | | M80 |
Mihaljević, Miodrag J. ; Korać, Vanja ; Todorović, Milan ; Šegan-Radonjić, Marija ; Vujošević, Sandra | Izgradnja osnova za virtuelnu desktop infrastruktura (VDI) sa kastomizovanim bezbednosnim rešenjima | 2016 | | M80 |
Mihaljević, Miodrag J. ; Marković, M.; Mijajlović, Z. | Izveštaj o bezbednosnim karakteristikama Digitrust PKI rešenja | 2006 | | M80 |
Mihaljević, Miodrag J. ; Korać, Vanja ; Todorović, Milan ; Marinković, Bojan | Kastomizovani metod i softfer za federativno upravljanje identitetima FIM (Federated Identity Management) | 2016 | | M85 |
Mihaljević, Miodrag J. | Key management schemes for stateless receivers based on time varying heterogeneous logical key hierarchy | 1-Dec-2003 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 2894; 137-154 | M23 |
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, Hideki | Key management with minimized secret storage employing an erasure channel approach | 1-Jan-2005 | IEEE Communications Letters; 9(8); 741-743 | M21 |
Mihaljević, Miodrag J. ; Marković, Zoran ; Urošević, Dragan ; Ognjanović, Zoran | Kolekcija tehničkih rešenja sa naprednim kriptografskim mehanizmima za servise zaštite podataka | 2001 | | M85 |
Mihaljević, Miodrag J. ; Ognjanović, Zoran | Komunikacija mašina-mašina javnim kanalima: Koncept i izazovi bezbednosti | 2013 | BISEC 2013, Srbija | M62 |
Mihaljević, Miodrag J. ; Stijović, D.; Marić, B.; Popadić, S.; Ivanović, M. | Koncept za uporedjivanje i uporedni pregled tri tehnike za za stitu informacionih sistema: Kerberos, SESAME i SSH | 1999 | Info-Science; 7(6); 8-13 | M50 |
Mihaljević, Miodrag J. ; Knežević, Milica | Kontrola pristupa podacima primenom blokčejn i broadcast encryption tehnika | 2020 | | M80 |
Abe, Masayuki; Aoki, Kazumaro; Ateniese, Giuseppe; Avanzi, Roberto; Beerliová, Zuzana; Billet, Olivier; Biryukov, Alex; Blake, Ian; Boyd, Colin; Brier, Eric; Castiglione, Aniello; Cha, Juyoung; Chan, Aldar; Chen, Liqun; Cho, Kookrae; Contini, Scott; D'Arco, Paolo; Ding, Jintai; Doche, Christophe; Dunkelman, Orr; Fitzi, Matthias; Fouque, Pierre Alain; Fournier, Jacques J.A.; Fujisaki, Kouichi; Fujisaki, Eiichiro; Furukawa, Jun; Galindo, David; Halevi, Shai; Handschuh, Helena; Heneghan, Chris; Holenstein, Thomas; Hoshino, Fumitaka; Hwang, Yong Ho; Isshiki, Toshiyuki; Jochemsz, Ellen; Joux, Antoine; Juels, Ari; Jutla, Charanjit; Kiayias, Aggelos; Kikuchi, Hiroaki; Kobayashi, Tetsutarou; Kohno, Tadayoshi; Krawczyk, Hugo; Kumar, Sandeep; Lange, Tanja; Lee, Jung Wook; Masucci, Barbara; May, Alexander; Mihaljević, Miodrag J. ; Minematsu, Kazuhiko; Monrose, Fabian; Montague, Paul; Myers, Steve; Naccache, David; Nicolosi, Antonio; Obana, Satoshi; Okazaki, Satomi; Okeya, Katsuyuki; Olivier, Francis; Oyono, Roger; Page, Dan; Park, Jung Hyung; Peng, Kun; Pietrzak, Krzysztof; Raub, Dominik; Sakai, Yasuyuki; Sakurai, Kouichi; Schindler, Werner; Seo, Jae Woo; Shin, Jong Hoon; Shparlinski, Igor; Steinfeld, Ron; Szydlo, Mike; Kalai, Yael Tauman; Teranishi, Isamu; Tokita, Toshio; Tunstall, Michael; Vercauteren, Frederik; Villegas, Karine; Walfish, Shabsi; Wang, Huaxiong; Wang, Xiaofeng; Warinschi, Bogdan; De Weger, Benne; Wolf, Christopher; Yampolskiy, Alex; Yang, Yeon Hyeong; Yin, Yiqun Lisa; Yoon, Jeong; Pointcheval, David | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface | 6-Jul-2006 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); CT-RSA 2006: The Cryptographers' Track at the RSA Conference 2006; 3960 LNCS | |
Mihaljević, Miodrag J. | Light-Weight and Provable Secure Cryptographic Techniques - The Key Components for Cyber Security and Efficient Smart Grid Deployment | 2013 | Global Wireless Summit (GSW) 2013, Atlantic City, US; 141-142 | M30 |
Kavčić, Aleksandar; Mihaljević, Miodrag J. ; Matsuura, Kanta | Light-weight secrecy system using channels with insertion errors: Cryptographic implications | 17-Dec-2015 | ITW 2015 - 2015 IEEE Information Theory Workshop; IEEE Information Theory Workshop, ITW 2015; Lotte City Hotel JejuJeju Island; South Korea; 11 October 2015 through 15 October 2015; 257-261 | |
Davidović, Tatjana ; Nives Radović, A.; Mihaljević, Miodrag J. ; Todorović, Milan ; Jelić, S. | Literature Review on the application of Blockchain Technology in Maritime Supply Chain Systems | 2022 | 2nd Kotor International Maritime Conference, Kotor, Montenegro, Nov. 27-30, 2022; Book of Abstracts; 37 | M34 |
Mihaljević, Miodrag J. ; Watanabe, Hajime; Imai, Hideki | A low complexity authentication protocol based on pseudorandomness, randomness and homophonic coding | 1-Dec-2010 | ISITA/ISSSTA 2010 - 2010 International Symposium on Information Theory and Its Applications; 690-695 | |
Mihaljević, Miodrag J. ; Watanabe, Hajime; Imai, Hideki | A Low Complexity Authentication Technique Based on Binary Channel with Deletion, Insertion and Complementing | 2007 | HISC 2007 - Hawaii IEICE and SITA Joint Conference on Information Theory, Honolulu, US; 95-100 | M30 |
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, Hideki | A Low-Complexity and High-Performance algorithm for the fast correlation attack | 1-Jan-2001 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 1978; 196-212 | M21 |