Researchers

Publications



Refined By:
???jsp.search.filter.citation_category???:  M22

Issue DateTitleAuthor(s)TypeМ-cat.
2024A Sharding Scheme Based on Graph Partitioning Algorithm for Public BlockchainXu, Shujiang; Wang, Ziye; Wang, Lianhai; Mihaljević, Miodrag J.  ; Zhang, Shuhui; Shao, Wei; Wang, QizhengArticle
22M22
2023An Approach for Blockchain and Symmetric Keys Broadcast Encryption Based Access Control in IoT (✓)Mihaljević, Miodrag J.  ; Knežević, Milica  ; Urošević, Dragan  ; Wang, Lianhai; Xu, ShujiangArticle
22M22
2023A Malware Detection Approach Based on Deep Learning and Memory Forensics (✓)Zhang, Shuhui; Hu, Changdong; Wang, Lianhai; Mihaljević, Miodrag J.  ; Xu, Shujiang; Lan, TianArticle
22M22
2023An Evaluation of Power Consumption Gain and Security of Flexible Green Pool Mining in Public Blockchain Systems (✓)Mihaljević, Miodrag J.  ; Todorović, Milan  ; Knežević, Milica  Article
22M22
2022An Approach for Security Enhancement of Certain Encryption Schemes Employing Error Correction Coding and Simulated Synchronization Errors (✓)Mihaljević, Miodrag J.  ; Wang, Lianhai; Xu, ShujiangArticle
22M22
2022An Approach for Blockchain Pool Mining Employing the Consensus Protocol Robust against Block Withholding and Selfish Mining Attacks (✓)Mihaljević, Miodrag J.  ; Wang, Lianhai; Xu, Shujiang; Todorović, Milan  Article
22M22
2022Security Enhanced Symmetric Key Encryption Employing an Integer Code for the Erasure Channel (✓)Mihaljević, Miodrag J.  ; Radonjić, Aleksandar  ; Wang, Lianhai; Xu, ShuijangArticle
22M22
2020Man-In-The-Middle Attack against Certain Authentication Protocols Revisited: Insights into the Approach and Performances Re-EvaluationKnežević, Milica  ; Tomović, Siniša  ; Mihaljević, Miodrag J.  Article
22M22
2019Security evaluation and design elements for a class of randomised encryptionsMihaljević, Miodrag  ; Oggier, FrédériqueArticle
22M22
2012Internal state recovery of Grain-v1 employing normality order of the filter functionMihaljević, Miodrag  ; Gangopadhyay, S.; Paul, G.; Imai, H.Article
22M22
2009An approach for stream ciphers design based on joint computing over random and secret dataMihaljević, Miodrag J.  ; Imai, HidekiArticle
22M22
2004Secret-public storage trade-off for broadcast encryption key managementMihaljević, Miodrag J.  ; Fossorier, Marc P. C.; Imai, HidekiArticle
22M22
2003On vulnerabilities and improvements of fast encryption algorithm for multimedia FEA-MMihaljević, Miodrag J.  Article
22M22
2003Two alerts for design of certain stream ciphers: Trapped LFSR and weak resilient function over GF(q)Camion, Paul; Mihaljević, Miodrag J.  ; Imai, HidekiArticle
22M22
2003Key management schemes for stateless receivers based on time varying heterogeneous logical key hierarchyMihaljević, Miodrag J.  Article
22M22
2003Broadcast encryption schemes based on the sectioned key treeMihaljević, Miodrag J.  Article
22M22
2003Security issues for software defined radio: Design of a secure download systemMichael, Lachlan B.; Mihaljević, Miodrag J.  ; Haruyama, Shinichiro; Kohno, RyujiArticle
22M22
2002Fast correlation attack algorithm with list decoding and an applicationMihaljević, Miodrag J.  ; Fossorier, Marc P. C.; Imai, HidekiArticle
22M22
1999A family of fast keystream generators based on programmable linear cellular automata over GF (q) and time-variant tableMihaljević, Miodrag J.  ; Imai, HidekiArticle
22M22
1999A family of fast dedicated one-way hash functions based on linear cellular automata over GF(qr)Mihaljević, Miodrag J.  ; Zheng, Yuliang; Imai, HidekiArticle
22M22