Showing results 211 to 225 of 225
< previous
Author(s) | Title | Issue Date | Appears in | Rank |
Mihaljević, Miodrag J. | Tehnički izveštaj o evaluaciji kriptografske sigurnosti DocuCrypt rešenja | 2007 | | M80 |
Mihaljević, Miodrag J. | Tehnički izveštaj o evaluaciji kriptografske sigurnosti i redizajniranom CashTeleport rešenju | 2007 | | M80 |
Mihaljević, Miodrag J. ; Marković, Zoran ; Davidović, Tatjana | Tehnički izveštaj o evaluaciji kriptografske sigurnosti određenih kriptografskih tehnika od perspektivnog interesa za GSM mrežu Mobilne telefonije, Telekoma Srbije | 2008 | | M80 |
Mihaljević, Miodrag J. ; Marković, Zoran ; Ognjanović, Zoran | Tehnički izveštaj o evaluaciji kriptografske sigurnosti tehnika za zaštitu govornog servisa Mobilne telefonije, Telekoma Srbije | 2007 | | M80 |
Mihaljević, Miodrag J. ; Marković, Zoran ; Ognjanović, Zoran | Tehnički izveštaj o evaluaciji kriptografske sigurnosti tehnika za zaštitu negovornih servisa Mobilne telefonije, Telekoma Srbije | 2007 | | M80 |
Tomović, Siniša ; Mihaljević, Miodrag J. ; Knežević, Milica | The Success Rate Reconsideration of the MIM Attack Against HB# Authentication Protocols | 2017 | COST Cryptanalysis of Ubiquitous Computing Systems (CRYPTACUS) Workshop, Sutomore, Montenegro; 110-145 | M30 |
Fossorier, Marc P. C.; Mihaljević, Miodrag J. ; Imai, Hideki | Time-Memory and Time-Memory-Data Trade-Off for Noisy Ciphertext | 2010 | ECRYPT Workshop on Tools for Cryptanalysis 2010; 27-36 | M30 |
Mihaljević, Miodrag J. ; Imai, Hideki | Towards Lightweight Cryptographic Primitives Employing Coding Theory | 2013 | BalkanCrypt 2013 | |
Xu, S.; Wang, F.; Mihaljević, Miodrag J. ; Zhang, S.; Shao, W.; Huang, Q. | Trusted Auditing of Data Operation Behaviors in Cloud based on Blockchain and TEE | 2023 | IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking, Dec. 21-24 Dec 2023; Proceedings; 447-455 | M33 |
Camion, Paul; Mihaljević, Miodrag J. ; Imai, Hideki | Two alerts for design of certain stream ciphers: Trapped LFSR and weak resilient function over GF(q) | 1-Dec-2003 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 2595; 196-213 | M23 |
Fossorier, Marc P. C.; Mihaljević, Miodrag J. ; Imai, Hideki | A unified analysis for the fast correlation attack | 1-Jan-2005 | IEEE International Symposium on Information Theory - Proceedings; 2005; 2012-2015 | |
Camion, P.; Mihaljević, Miodrag J. ; Imai, Hideki | Vulnerability of certain keystream generators based on resilient functions | 2000 | ISITA2000, Hawaii, USA; 70-73 | M30 |
Mihaljević, Miodrag J. ; Oggier, Frédérique | Wire-tap Approach to enhance security in communication systems using the encoding-encryption paradigm | 19-Jul-2010 | ICT 2010: 2010 17th International Conference on Telecommunications, 4-7 April 2010; 83-88 | |
Lachlan, Michael; Mihaljević, Miodrag J. | Wireless data communication method and apparatus for software download system | 2009 | | M91 |
Mihaljević, Miodrag J. | Приказ остварења Математичког института САНУ у домену дигиталне приватности/безбедности и илустративни примери | 2017 | Privatnost u digitalnom dobu: Iluzija ili nacionalni izazov | M62 |