Issue Date | Title | Author(s) | Type | М-cat. |
2024 | A Sharding Scheme Based on Graph Partitioning Algorithm for Public Blockchain | Xu, Shujiang; Wang, Ziye; Wang, Lianhai; Mihaljević, Miodrag J. ; Zhang, Shuhui; Shao, Wei; Wang, Qizheng | Article | |
2023 | An Approach for Blockchain and Symmetric Keys Broadcast Encryption Based Access Control in IoT (✓) | Mihaljević, Miodrag J. ; Knežević, Milica ; Urošević, Dragan ; Wang, Lianhai; Xu, Shujiang | Article | |
2023 | A Malware Detection Approach Based on Deep Learning and Memory Forensics (✓) | Zhang, Shuhui; Hu, Changdong; Wang, Lianhai; Mihaljević, Miodrag J. ; Xu, Shujiang; Lan, Tian | Article | |
2023 | An Evaluation of Power Consumption Gain and Security of Flexible Green Pool Mining in Public Blockchain Systems (✓) | Mihaljević, Miodrag J. ; Todorović, Milan ; Knežević, Milica ![](/image/organisations_icon_ico.png) | Article | |
2022 | An Approach for Security Enhancement of Certain Encryption Schemes Employing Error Correction Coding and Simulated Synchronization Errors (✓) | Mihaljević, Miodrag J. ; Wang, Lianhai; Xu, Shujiang | Article | |
2022 | An Approach for Blockchain Pool Mining Employing the Consensus Protocol Robust against Block Withholding and Selfish Mining Attacks (✓) | Mihaljević, Miodrag J. ; Wang, Lianhai; Xu, Shujiang; Todorović, Milan ![](/image/organisations_icon_ico.png) | Article | |
2022 | Security Enhanced Symmetric Key Encryption Employing an Integer Code for the Erasure Channel (✓) | Mihaljević, Miodrag J. ; Radonjić, Aleksandar ; Wang, Lianhai; Xu, Shuijang | Article | |
2020 | Man-In-The-Middle Attack against Certain Authentication Protocols Revisited: Insights into the Approach and Performances Re-Evaluation | Knežević, Milica ; Tomović, Siniša ; Mihaljević, Miodrag J. ![](/image/organisations_icon_ico.png) | Article | |
2019 | Security evaluation and design elements for a class of randomised encryptions | Mihaljević, Miodrag ; Oggier, Frédérique | Article | |
2012 | Internal state recovery of Grain-v1 employing normality order of the filter function | Mihaljević, Miodrag ; Gangopadhyay, S.; Paul, G.; Imai, H. | Article | |
2009 | An approach for stream ciphers design based on joint computing over random and secret data | Mihaljević, Miodrag J. ; Imai, Hideki | Article | |
2004 | Secret-public storage trade-off for broadcast encryption key management | Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, Hideki | Article | |
2003 | On vulnerabilities and improvements of fast encryption algorithm for multimedia FEA-M | Mihaljević, Miodrag J. ![](/image/organisations_icon_ico.png) | Article | |
2003 | Two alerts for design of certain stream ciphers: Trapped LFSR and weak resilient function over GF(q) | Camion, Paul; Mihaljević, Miodrag J. ; Imai, Hideki | Article | |
2003 | Key management schemes for stateless receivers based on time varying heterogeneous logical key hierarchy | Mihaljević, Miodrag J. ![](/image/organisations_icon_ico.png) | Article | |
2003 | Broadcast encryption schemes based on the sectioned key tree | Mihaljević, Miodrag J. ![](/image/organisations_icon_ico.png) | Article | |
2003 | Security issues for software defined radio: Design of a secure download system | Michael, Lachlan B.; Mihaljević, Miodrag J. ; Haruyama, Shinichiro; Kohno, Ryuji | Article | |
2002 | Fast correlation attack algorithm with list decoding and an application | Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, Hideki | Article | |
1999 | A family of fast keystream generators based on programmable linear cellular automata over GF (q) and time-variant table | Mihaljević, Miodrag J. ; Imai, Hideki | Article | |
1999 | A family of fast dedicated one-way hash functions based on linear cellular automata over GF(qr) | Mihaljević, Miodrag J. ; Zheng, Yuliang; Imai, Hideki | Article | |