Browsing by Author Mihaljević, Miodrag J.


Or, select a letter below to browse by last name
0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 189 to 208 of 233 < previous   next >
Author(s)TitleIssue DateAppears inRank
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, HidekiSecret-public storage trade-off for broadcast encryption key management1-Dec-2004Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 3269; 375-387M23
Mihaljević, Miodrag J. A security enhanced encryption scheme and evaluation of its cryptographic security1-Jul-2019Entropy : international and interdisciplinary journal of entropy and information studies; 21(7)M21
Mihaljević, Miodrag J. ; Radonjić, Aleksandar; Wang, Lianhai; Xu, ShujiangSecurity Enhanced Symmetric Key Encryption Employing an Integer Code for the Erasure Channel2022Symmetry; 14(8); 1709~M22
Mihaljević, Miodrag J. ; Oggier, FrédériqueSecurity evaluation and design elements for a class of randomised encryptions1-Jan-2019IET Information Security; 13(1); 36-47M23
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, HidekiSecurity Evaluation of Certain Broadcast Encryption Models Employing a Dedicated Time-Memory Trade-Off Approach2007HISC 2007 - Hawaii IEICE and SITA Joint Conference on Information Theory, Honolulu, US; 125-129M30
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, HidekiSecurity evaluation of certain broadcast encryption schemes employing a generalized time-memory-data trade-off1-Dec-2007IEEE Communications Letters; 11(12); 988-990M22
Mihaljević, Miodrag J. ; Imai, HidekiA security evaluation of certain stream ciphers which involve randomness and coding1-Dec-2010ISITA/ISSSTA 2010 - 2010 International Symposium on Information Theory and Its Applications; 20th International Symposium on Information Theory and Its Applications, ISITA 2010 and the 2010 20th International Symposium on Spread Spectrum Techniques and Applications, ISSSTA 2010; Taichung; Taiwan; 17 October 2010 through 20 October 2010; 789-794
Tomović, Siniša ; Knežević, Milica ; Mihaljević, Miodrag J. ; Perović, Aleksandar; Ognjanović, Zoran Security evaluation of NHB# authentication protocol against a MIM attack2016The IPSI BgD Transactions on Internet Research; 12(2); 22-36
Mihaljević, Miodrag J. ; Watanabe, Hajime; Imai, HidekiSecurity evaluation of stream ciphers2002Computer Today; 107; 4-10M50
Matsui, Mitsuru; Mihaljević, Miodrag J. Security Evaluation Techniques for Symmetric Cryptography2004Information Security Handbook; 145-160M14
Mihaljević, Miodrag J. Security examination of a cellular automata based pseudorandom bit generator using an algebraic replica approach1-Jan-1997Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 1255; 250-262M23
Michael, Lachlan B.; Mihaljević, Miodrag J. ; Haruyama, Shinichiro; Kohno, RyujiSecurity issues for software defined radio: Design of a secure download system1-Jan-2003IEICE Transactions on Communications; E85-B(12); 2588-2600M22
Mihaljević, Miodrag J. ; Imai, HidekiSecurity Issues of Cloud Computing and an Encryption Approach2014Handbook of Research on High Performance and Cloud Computing in Scientific Research and Education; 388-408M14
Mihaljević, Miodrag J. ; Imai, HidekiSecurity issues of cloud computing and an encryption approach31-Oct-2014Cloud Technology: Concepts, Methodologies, Tools, and Applications; 3; 1527-1547
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, HidekiSecurity weaknesses of certain broadcast encryption schemes1-Jan-2006Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 3919 LNCS; 228-245M23
Mikhalev, Vasily; Mihaljević, Miodrag J. ; Kara, Orhun; Armknecht, FrederikSelected Design and Analysis Techniques of Contemporary Symmetric Encryption2021Security of Ubiquitous Computing Systems; 49-62M14
Mihaljević, Miodrag J. A sequence comparison approach for decoding of general binary block code after the binary summetric channel with synchronization errors1-Jan-1996ZAMM Zeitschrift fur Angewandte Mathematik und Mechanik; 76; 479-480M23
Xu, Shujiang; Wang, Ziye; Wang, Lianhai; Mihaljević, Miodrag J. ; Zhang, Shuhui; Shao, Wei; Wang, QizhengA Sharding Scheme Based on Graph Partitioning Algorithm for Public Blockchain11-Mar-2024CMES - Computer Modeling in Engineering and Sciences; 139(3); 3311-3327~M22
Mihaljević, Miodrag J. „Sinergy of Machine Learning, Information Security and Blockchain for Metaverse“, Invited Talk2024International Conference on the Cooperation and Integration of Industry, Education, Research and Application, Data Science and Technology Session, Jinan, China, 22 Nov. 2024.M31
Wang, Qizheng; Wang, Lianhai; Xu, Shujiang; Zhang, Shuhui; Shao, Wei; Mihaljević, Miodrag J. Single-Layer Trainable Neural Network for Secure Inference2025IEEE Internet of Things Journal; 12(3); 2968-2978~M21a