Loading... 3 0 20 0 false
Full Name
Mihaljević, Miodrag J.
Scopus Author ID
Country
Serbia
Loading... 2 0 20 0 false


Results 1-20 of 79 (Search time: 0.006 seconds).

Author(s)TitleIssue DateAppears inRank
1Xu, Shujiang; Zhang, Lulu; Wang, Lianhai; Mihaljević, Miodrag J. ; Zhang, Shuhui; Shao, Wei; Wang, QizhengRelay network-based cross-chain data interaction protocol with integrity audit1-Jul-2024Computers and Electrical Engineering; 117; 109262~M21
2Xu, Shujiang; Wang, Ziye; Wang, Lianhai; Mihaljević, Miodrag J. ; Zhang, Shuhui; Shao, Wei; Wang, QizhengA Sharding Scheme Based on Graph Partitioning Algorithm for Public Blockchain11-Mar-2024CMES - Computer Modeling in Engineering and Sciences; 139(3); 3311-3327~M22
3Wang, Qizheng; Wang, Lianhai; Xu, Shujiang; Zhang, Shuhui; Shao, Wei; Mihaljević, Miodrag J. Single-Layer Trainable Neural Network for Secure Inference2024IEEE Internet of Things Journal~M21a
4Mihaljević, Miodrag J. ; Knežević, Milica ; Urošević, Dragan ; Wang, Lianhai; Xu, ShujiangAn Approach for Blockchain and Symmetric Keys Broadcast Encryption Based Access Control in IoT2023Symmetry; 15(2); 299~M22
5Zhang, Shuhui; Hu, Changdong; Wang, Lianhai; Mihaljević, Miodrag J. ; Xu, Shujiang; Lan, TianA Malware Detection Approach Based on Deep Learning and Memory Forensics2023Symmetry; 15(3); 758~M22
6Mihaljević, Miodrag J. ; Todorović, Milan ; Knežević, Milica An Evaluation of Power Consumption Gain and Security of Flexible Green Pool Mining in Public Blockchain Systems2023Symmetry; 15(4); 924~M22
7Mihaljević, Miodrag J. ; Wang, Lianhai; Xu, ShujiangAn Approach for Security Enhancement of Certain Encryption Schemes Employing Error Correction Coding and Simulated Synchronization Errors2022Entropy; 24(3); 406~M22
8Mihaljević, Miodrag J. ; Radonjić, Aleksandar; Wang, Lianhai; Xu, ShujiangSecurity Enhanced Symmetric Key Encryption Employing an Integer Code for the Erasure Channel2022Symmetry; 14(8); 1709~M22
9Mihaljević, Miodrag J. ; Wang, Lianhai; Xu, Shujiang; Todorović, Milan An Approach for Blockchain Pool Mining Employing the Consensus Protocol Robust against Block Withholding and Selfish Mining Attacks2022Symmetry; 14(8); 1711~M22
10Tomović, Siniša ; Knežević, Milica ; Mihaljević, Miodrag J. Analysis and Correction of the Attack against the LPN-Problem Based Authentication Protocols8-Mar-2021Mathematics; 9(5); 573~M21a
11Knežević, Milica ; Tomović, Siniša ; Mihaljević, Miodrag J. Man-In-The-Middle Attack against Certain Authentication Protocols Revisited: Insights into the Approach and Performances Re-Evaluation12-Aug-2020Electronics; 9(8); 1-23M22
12Mihaljević, Miodrag J. A Blockchain Consensus Protocol Based on Dedicated Time-Memory-Data Trade-Off30-Jul-2020IEEE Access; 8; 141258-141268M21
13Mihaljević, Miodrag J. Bitcoin, Blockchain Technology and Cryptography - An Illustration of Certain Issues2020Anali ogranka SANU u Novom Sadu; 41-47
14Mihaljević, Miodrag J. A security enhanced encryption scheme and evaluation of its cryptographic security1-Jul-2019Entropy : international and interdisciplinary journal of entropy and information studies; 21(7)M21
15Mihaljević, Miodrag J. ; Oggier, FrédériqueSecurity evaluation and design elements for a class of randomised encryptions1-Jan-2019IET Information Security; 13(1); 36-47M23
16Arsić, Aleksandra ; Jelisavčić, Vladislav; Mihaljević, Miodrag J. Experimental Evaluation of Certain Security Issues of Grain v1 Stream CipherJul-2016IPSI BgD Transactions; 12(2); 37-45
17Mihaljević, Miodrag J. ; Kavčić, Aleksandar; Matsuura, KantaAn Encryption Technique for Provably Secure Transmission from a High Performance Computing Entity to a Tiny One1-Jan-2016Mathematical Problems in Engineering; 2016M23
18Tomović, Siniša ; Mihaljević, Miodrag J. ; Perović, Aleksandar; Ognjanović, Zoran A Protocol for Provably Secure Authentication of a Tiny Entity to a High Performance Computing One1-Jan-2016Mathematical Problems in Engineering; 2016; 9289050:1-9289050:9M23
19Tomović, Siniša ; Knežević, Milica ; Mihaljević, Miodrag J. ; Perović, Aleksandar; Ognjanović, Zoran Security evaluation of NHB# authentication protocol against a MIM attack2016The IPSI BgD Transactions on Internet Research; 12(2); 22-36
20Mihaljević, Miodrag J. An Algebraic Security Evaluation Approach of Certain Encryption Techniques2016The IPSI BgD Transactions on Advanced Research; 12(2); 38-44M53

Projects



Results 1-6 of 6 (Search time: 0.0 seconds).

AcronymTitleStart dateCompletionP-Investigator
A decentralized blockchain platform for reading, writing, publishing, selling and buying e-books01-07-202030-06-2022Mihaljević, Miodrag J.
PROJECT 0274A Software System For Cryptographic Protection of the Electronic Archives01-01-200231-12-2004Mihaljević, Miodrag J.
PROJECT 1625Advanced Mathematical Methods for Cryptographic Security and Modelling of Information01-01-200231-12-2005Mihaljević, Miodrag J.
PROJECT 144018Advanced methods for cryptology and information processing01-01-200631-12-2010Mihaljević, Miodrag J.
PROJECT 174008Advanced Techniques of Cryptology, Image Processing and Computational Topology for Information Security01-01-201131-12-2019Mihaljević, Miodrag J.
PROJECT 04M02Mathematical Logic, Combinatorics and Information Processing: Foundations and Applications of Computer Science01-01-199631-12-2000Mihaljević, Miodrag J.