Researchers

Publications



Refined By:
Type:  article

Results 1-20 of 79

Issue DateTitleAuthor(s)TypeМ-cat.
2024A Sharding Scheme Based on Graph Partitioning Algorithm for Public BlockchainXu, Shujiang; Wang, Ziye; Wang, Lianhai; Mihaljević, Miodrag J.  ; Zhang, Shuhui; Shao, Wei; Wang, QizhengArticle
22M22
2024Relay network-based cross-chain data interaction protocol with integrity auditXu, Shujiang; Zhang, Lulu; Wang, Lianhai; Mihaljević, Miodrag J.  ; Zhang, Shuhui; Shao, Wei; Wang, QizhengArticle
21M21
2023An Approach for Blockchain and Symmetric Keys Broadcast Encryption Based Access Control in IoT (✓)Mihaljević, Miodrag J.  ; Knežević, Milica  ; Urošević, Dragan  ; Wang, Lianhai; Xu, ShujiangArticle
22M22
2023A Malware Detection Approach Based on Deep Learning and Memory Forensics (✓)Zhang, Shuhui; Hu, Changdong; Wang, Lianhai; Mihaljević, Miodrag J.  ; Xu, Shujiang; Lan, TianArticle
22M22
2023An Evaluation of Power Consumption Gain and Security of Flexible Green Pool Mining in Public Blockchain Systems (✓)Mihaljević, Miodrag J.  ; Todorović, Milan  ; Knežević, Milica  Article
22M22
2022An Approach for Security Enhancement of Certain Encryption Schemes Employing Error Correction Coding and Simulated Synchronization Errors (✓)Mihaljević, Miodrag J.  ; Wang, Lianhai; Xu, ShujiangArticle
22M22
2022An Approach for Blockchain Pool Mining Employing the Consensus Protocol Robust against Block Withholding and Selfish Mining Attacks (✓)Mihaljević, Miodrag J.  ; Wang, Lianhai; Xu, Shujiang; Todorović, Milan  Article
22M22
2022Security Enhanced Symmetric Key Encryption Employing an Integer Code for the Erasure Channel (✓)Mihaljević, Miodrag J.  ; Radonjić, Aleksandar  ; Wang, Lianhai; Xu, ShuijangArticle
22M22
2021Analysis and Correction of the Attack against the LPN-Problem Based Authentication Protocols (✓)Tomović, Siniša  ; Knežević, Milica  ; Mihaljević, Miodrag J.  Article
21aM21a
2020Bitcoin, Blockchain Technology and Cryptography - An Illustration of Certain IssuesMihaljević, Miodrag J.  Article
Mp. category will be shown later
2020Man-In-The-Middle Attack against Certain Authentication Protocols Revisited: Insights into the Approach and Performances Re-EvaluationKnežević, Milica  ; Tomović, Siniša  ; Mihaljević, Miodrag J.  Article
22M22
2020A Blockchain Consensus Protocol Based on Dedicated Time-Memory-Data Trade-OffMihaljević, Miodrag J.  Article
21M21
2019A security enhanced encryption scheme and evaluation of its cryptographic securityMihaljević, Miodrag  Article
21M21
2019Security evaluation and design elements for a class of randomised encryptionsMihaljević, Miodrag  ; Oggier, FrédériqueArticle
22M22
2016Security evaluation of the NHB# authentication protocol against a MIM attackTomović, Siniša S.  ; Knežević, Milica  ; Mihaljević, Miodrag  ; Perović, Aleksandar M.  ; Ognjanović, Zoran  Article
Mp. category will be shown later
2016Security evaluation of NHB# authentication protocol against a MIM attackTomović, Siniša  ; Knežević, Milica  ; Mihaljević, Miodrag J.  ; Perović, Aleksandar; Ognjanović, Zoran  Article
Mp. category will be shown later
2016An Encryption Technique for Provably Secure Transmission from a High Performance Computing Entity to a Tiny OneMihaljević, Miodrag  ; Kavčić, Aleksandar; Matsuura, KantaArticle
23M23
2016An Algebraic Security Evaluation Approach of Certain Encryption TechniquesMihaljević, Miodrag  Article
Mp. category will be shown later
2016Experimental Evaluation of Certain Security Issues of Grain v1 Stream CipherArsić, Aleksandra  ; Jelisavčić, Vladislav; Mihaljević, Miodrag J.  Article
Mp. category will be shown later
2016Experimental Evaluation of Certain Securty Issues of Grain v1 Stream CipherArsić, Aleksandra  ; Jelisavčić, Vladisav  ; Mihaljević, Miodrag  Article
Mp. category will be shown later

Results 1-20 of 79