Loading... 3 0 20 0 false
Full Name
Mihaljević, Miodrag J.
Scopus Author ID
Country
Serbia
Loading... 2 0 20 0 false

Results 101-120 of 225 (Search time: 0.027 seconds).

Author(s)TitleIssue DateAppears inRank
101Mihaljević, Miodrag J. ; Ognjanović, Zoran Komunikacija mašina-mašina javnim kanalima: Koncept i izazovi bezbednosti2013BISEC 2013, SrbijaM62
102Mihaljević, Miodrag J. On Certain Problems of Cryptology and Computational Complexity of Processing over Uncertain Data2013Logic and Applications - LAP 2013M34
103Mihaljević, Miodrag J. ; Imai, HidekiContemporary Challenges of Cryptology for Cyber-Security2013WECT-INFOFEST 2013, WECT-INFOFEST 2013, Montenegro, 30. Sep - 05. Oct, 2013M32
104Mihaljević, Miodrag J. ; Todorović, Milan ; Maksimović, Petar; Roksandić, S.; Milojević-Jevrić, Marija; Marinković, Bojan Analiza sadržaja baza podataka o ostvarivanju napredne informacione bezbednosti u Cloud Computing2013M80
105Mihaljević, Miodrag J. ; Roksandić, S.; Laban, M.; Marinković, Bojan Analiza sadržaja baza podataka o ostvarivanju napredne informacione bezbednosti za M2M (masina-masina) komunikacije u okviru IoT2013M80
106Mihaljević, Miodrag J. An approach for light-weight encryption employing dedicated coding1-Dec-2012GLOBECOM - IEEE Global Telecommunications Conference; IEEE Global Communications Conference, GLOBECOM 2012; Anaheim, CA; United States; 3 December 2012 through 7 December 2012; 874-880
107Mihaljević, Miodrag J. ; Gangopadhyay, Sugata; Paul, Goutam; Imai, HidekiInternal state recovery of keystream generator LILI-128 based on a novel weakness of the employed Boolean function15-Nov-2012Information Processing Letters; 112(21); 805-810M23
108Mihaljević, Miodrag J. ; Gangopadhyay, Sugata; Paul, Goutam; Imai, HidekiGeneric cryptographic weakness of k-normal Boolean functions in certain stream ciphers and cryptanalysis of grain-1281-Oct-2012Periodica Mathematica Hungarica; 65(2); 205-227M23
109Mihaljević, Miodrag J. ; Gangopadhyay, Sugata; Paul, Goutam; Imai, HidekiInternal state recovery of Grain-v1 employing normality order of the filter function1-Jun-2012IET Information Security; 6(2); 55-64M23
110Mihaljević, Miodrag J. On Certain Approaches for Analysis and Design of Cryptographic Techniques for Symmetric Encryption and Key Management2012Selected Topics of Image Processing and Cryptology; 15; 119-186M14
111Mihaljević, Miodrag J. On Certain Coding Approaches for Security Evaluation and Design of Stream Ciphers2012The IPSI BgD Transactions on Advanced Research; 8(2); 28-34M53
112Mihaljević, Miodrag J. ; Imai, Hideki; David, Michael; Kobara, Kazukuni; Watanabe, HajimeOn advanced cryptographic techniques for information security of smart grid AMI1-Dec-2011ACM International Conference Proceeding Series; 7th Annual Cyber Security and Information Intelligence Research Workshop: Energy Infrastructure Cyber Protection, CSIIRW11; Oak Ridge, TN; United States; 12 October 2011 through 14 October 2011
113Mihaljević, Miodrag J. ; Gangopadhyay, S.; Paul, G.; Imai, H.An Algorithm for the Internal State Recoverz of Grain-v12011Record of the 11th Central European Conference on Cryptology, Hungary, 30. Jun - 02. Jul, 2011; 1-14M33
114Mihaljević, Miodrag J. ; Imai, HidekiOn Employment of Homophonic Coding for Improvement of Certain Encryption Approaches Based on the LPN Problem20112011 Symmetric Key Encryption Workshop - SKEW 2011, Copenhagen, Denmark; 1-17M30
115Mihaljević, Miodrag J. ; Abe, JoujiMethod and apparatus for cellular automata based generation of pseudorandom sequences with controllable period2011M91
116Mihaljević, Miodrag J. ; Watanabe, HajimeAuthentication system using light-weight authentication protocol2011M91
117Mihaljević, Miodrag J. ; Imai, HidekiAn Information-Theoretic and Computational Complexity Security Analysis of a Randomized Stream Cipher Mode20114th Western European Workshop on Research in Cryptology - WEWoRC 2011, Weimar, Germany; 21-25M30
118Mihaljević, Miodrag J. ; Watanabe, Hajime; Imai, HidekiA low complexity authentication protocol based on pseudorandomness, randomness and homophonic coding1-Dec-2010ISITA/ISSSTA 2010 - 2010 International Symposium on Information Theory and Its Applications; 690-695
119Mihaljević, Miodrag J. ; Gangopadhyay, Sugata; Paul, Goutam; Imai, HidekiA generic weakness of the k-normal boolean functions exposed to dedicated algebraic attack1-Dec-2010ISITA/ISSSTA 2010 - 2010 International Symposium on Information Theory and Its Applications; 911-916
120Mihaljević, Miodrag J. ; Imai, HidekiA security evaluation of certain stream ciphers which involve randomness and coding1-Dec-2010ISITA/ISSSTA 2010 - 2010 International Symposium on Information Theory and Its Applications; 20th International Symposium on Information Theory and Its Applications, ISITA 2010 and the 2010 20th International Symposium on Spread Spectrum Techniques and Applications, ISSSTA 2010; Taichung; Taiwan; 17 October 2010 through 20 October 2010; 789-794

Projects



Results 1-6 of 6 (Search time: 0.001 seconds).

AcronymTitleStart dateCompletionP-Investigator
A decentralized blockchain platform for reading, writing, publishing, selling and buying e-books01-07-202030-06-2022Mihaljević, Miodrag J.
PROJECT 0274A Software System For Cryptographic Protection of the Electronic Archives01-01-200231-12-2004Mihaljević, Miodrag J.
PROJECT 1625Advanced Mathematical Methods for Cryptographic Security and Modelling of Information01-01-200231-12-2005Mihaljević, Miodrag J.
PROJECT 144018Advanced methods for cryptology and information processing01-01-200631-12-2010Mihaljević, Miodrag J.
PROJECT 174008Advanced Techniques of Cryptology, Image Processing and Computational Topology for Information Security01-01-201131-12-2019Mihaljević, Miodrag J.
PROJECT 04M02Mathematical Logic, Combinatorics and Information Processing: Foundations and Applications of Computer Science01-01-199631-12-2000Mihaljević, Miodrag J.