Browsing by Author Mihaljević, Miodrag J.


Or, select a letter below to browse by last name
0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 183 to 202 of 225 < previous   next >
Author(s)TitleIssue DateAppears inRank
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, HidekiSecret-public storage trade-off for broadcast encryption key management1-Dec-2004Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 3269; 375-387M23
Mihaljević, Miodrag J. A security enhanced encryption scheme and evaluation of its cryptographic security1-Jul-2019Entropy : international and interdisciplinary journal of entropy and information studies; 21(7)M21
Mihaljević, Miodrag J. ; Radonjić, Aleksandar; Wang, Lianhai; Xu, ShujiangSecurity Enhanced Symmetric Key Encryption Employing an Integer Code for the Erasure Channel2022Symmetry; 14(8); 1709~M22
Mihaljević, Miodrag J. ; Oggier, FrédériqueSecurity evaluation and design elements for a class of randomised encryptions1-Jan-2019IET Information Security; 13(1); 36-47M23
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, HidekiSecurity Evaluation of Certain Broadcast Encryption Models Employing a Dedicated Time-Memory Trade-Off Approach2007HISC 2007 - Hawaii IEICE and SITA Joint Conference on Information Theory, Honolulu, US; 125-129M30
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, HidekiSecurity evaluation of certain broadcast encryption schemes employing a generalized time-memory-data trade-off1-Dec-2007IEEE Communications Letters; 11(12); 988-990M22
Mihaljević, Miodrag J. ; Imai, HidekiA security evaluation of certain stream ciphers which involve randomness and coding1-Dec-2010ISITA/ISSSTA 2010 - 2010 International Symposium on Information Theory and Its Applications; 20th International Symposium on Information Theory and Its Applications, ISITA 2010 and the 2010 20th International Symposium on Spread Spectrum Techniques and Applications, ISSSTA 2010; Taichung; Taiwan; 17 October 2010 through 20 October 2010; 789-794
Tomović, Siniša ; Knežević, Milica ; Mihaljević, Miodrag J. ; Perović, Aleksandar; Ognjanović, Zoran Security evaluation of NHB# authentication protocol against a MIM attack2016The IPSI BgD Transactions on Internet Research; 12(2); 22-36
Mihaljević, Miodrag J. ; Watanabe, Hajime; Imai, HidekiSecurity evaluation of stream ciphers2002Computer Today; 107; 4-10M50
Matsui, Mitsuru; Mihaljević, Miodrag J. Security Evaluation Techniques for Symmetric Cryptography2004Information Security Handbook; 145-160M14
Mihaljević, Miodrag J. Security examination of a cellular automata based pseudorandom bit generator using an algebraic replica approach1-Jan-1997Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 1255; 250-262M23
Michael, Lachlan B.; Mihaljević, Miodrag J. ; Haruyama, Shinichiro; Kohno, RyujiSecurity issues for software defined radio: Design of a secure download system1-Jan-2003IEICE Transactions on Communications; E85-B(12); 2588-2600M22
Mihaljević, Miodrag J. ; Imai, HidekiSecurity Issues of Cloud Computing and an Encryption Approach2014Handbook of Research on High Performance and Cloud Computing in Scientific Research and Education; 388-408M14
Mihaljević, Miodrag J. ; Imai, HidekiSecurity issues of cloud computing and an encryption approach31-Oct-2014Cloud Technology: Concepts, Methodologies, Tools, and Applications; 3; 1527-1547
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, HidekiSecurity weaknesses of certain broadcast encryption schemes1-Jan-2006Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 3919 LNCS; 228-245M23
Mikhalev, Vasily; Mihaljević, Miodrag J. ; Kara, Orhun; Armknecht, FrederikSelected Design and Analysis Techniques of Contemporary Symmetric Encryption2021Security of Ubiquitous Computing Systems; 49-62M14
Mihaljević, Miodrag J. A sequence comparison approach for decoding of general binary block code after the binary summetric channel with synchronization errors1-Jan-1996ZAMM Zeitschrift fur Angewandte Mathematik und Mechanik; 76; 479-480M23
Xu, Shujiang; Wang, Ziye; Wang, Lianhai; Mihaljević, Miodrag J. ; Zhang, Shuhui; Shao, Wei; Wang, QizhengA Sharding Scheme Based on Graph Partitioning Algorithm for Public Blockchain11-Mar-2024CMES - Computer Modeling in Engineering and Sciences; 139(3); 3311-3327~M22
Wang, Qizheng; Wang, Lianhai; Xu, Shujiang; Zhang, Shuhui; Shao, Wei; Mihaljević, Miodrag J. Single-Layer Trainable Neural Network for Secure Inference2024IEEE Internet of Things Journal~M21a
Knežević, Milica ; Todorović, Milan ; Mihaljević, Miodrag J. Softver blokčejn sistema za kontrolu integriteta podataka u oblaku2020M85