Issue Date | Title | Author(s) | Type | М-cat. |
2024 | A Sharding Scheme Based on Graph Partitioning Algorithm for Public Blockchain | Xu, Shujiang; Wang, Ziye; Wang, Lianhai; Mihaljević, Miodrag J. ; Zhang, Shuhui; Shao, Wei; Wang, Qizheng | Article | |
2023 | An Evaluation of Power Consumption Gain and Security of Flexible Green Pool Mining in Public Blockchain Systems (✓) | Mihaljević, Miodrag J. ; Todorović, Milan ; Knežević, Milica | Article | |
2023 | An Approach for Blockchain and Symmetric Keys Broadcast Encryption Based Access Control in IoT (✓) | Mihaljević, Miodrag J. ; Knežević, Milica ; Urošević, Dragan ; Wang, Lianhai; Xu, Shujiang | Article | |
2023 | A Malware Detection Approach Based on Deep Learning and Memory Forensics (✓) | Zhang, Shuhui; Hu, Changdong; Wang, Lianhai; Mihaljević, Miodrag J. ; Xu, Shujiang; Lan, Tian | Article | |
2022 | An Approach for Security Enhancement of Certain Encryption Schemes Employing Error Correction Coding and Simulated Synchronization Errors (✓) | Mihaljević, Miodrag J. ; Wang, Lianhai; Xu, Shujiang | Article | |
2022 | An Approach for Blockchain Pool Mining Employing the Consensus Protocol Robust against Block Withholding and Selfish Mining Attacks (✓) | Mihaljević, Miodrag J. ; Wang, Lianhai; Xu, Shujiang; Todorović, Milan | Article | |
2022 | Security Enhanced Symmetric Key Encryption Employing an Integer Code for the Erasure Channel (✓) | Mihaljević, Miodrag J. ; Radonjić, Aleksandar ; Wang, Lianhai; Xu, Shuijang | Article | |
2020 | Man-In-The-Middle Attack against Certain Authentication Protocols Revisited: Insights into the Approach and Performances Re-Evaluation | Knežević, Milica ; Tomović, Siniša ; Mihaljević, Miodrag J. | Article | |