Search

Your search keyword '"Danilo Gligoroski"' showing total 49 results

Search Constraints

Start Over You searched for: Author "Danilo Gligoroski" Remove constraint Author: "Danilo Gligoroski" Topic computer science Remove constraint Topic: computer science
49 results on '"Danilo Gligoroski"'

Search Results

1. Non-Interactive VDF Client Puzzle for DoS Mitigation

2. R3V: Robust Round Robin VDF-based Consensus

3. Efficient Novel Privacy Preserving PoS Protocol Proof-of-concept with Algorand

4. Blockchain for Increased Trust in Virtual Health Care: Proof-of-Concept Study

5. The Meshwork Ledger, its Consensus and Reward Mechanisms

6. Vulnerability Analysis of 2500 Docker Hub Images

7. Micro - GAGE: A Low-power Compact GAGE Hash Function Processor for IoT Applications

8. 5G Network Slice Isolation with WireGuard and Open Source MANO: A VPNaaS Proof-of-Concept

9. A Cloud-based SDN/NFV Testbed for End-to-End Network Slicing in 4G/5G

10. Trends in Development of Databases and Blockchain

11. GDPR Compliance for Blockchain Applications in Healthcare

12. VerifyMed -- A blockchain platform for transparent trust in virtualized healthcare: Proof-of-concept

13. Towards 5G Intrusion Detection Scenarios with OMNeT++

14. Preventing DDoS with SDN in 5G

15. SoK of Used Cryptography in Blockchain

16. Blockchain in healthcare and health sciences—A scoping review

17. Network Traffic Driven Storage Repair

18. Repair Duality with Locally Repairable and Locally Regenerating Codes

19. CARIBE: Cascaded IBE for Maximum Flexibility and User-Side Control

20. HashTag Erasure Codes: From Theory to Practice

21. Balanced locally repairable codes

22. A 16-Bit Reconfigurable Encryption Processor for p-Cipher

23. Semantic Security and Key-Privacy with Random Split of St-Gen Codes

24. Reviving the Idea of Incremental Cryptography for the Zettabyte Era Use Case: Incremental Hash Functions Based on SHA-3

25. Coded Packet Transport for Optical Packet/Burst Switched Networks

26. CryptoCloak protocol and the prototype application

27. Approaching Maximum Embedding Efficiency on Small Covers Using Staircase-Generator Codes

28. Joint balanced source and network coding

29. CryptoCloak - improvement proposal implementation

30. Simulation of some new models of error-detecting codes

31. On Privacy Protection in the Internet Surveillance Era

32. π-Cipher: Authenticated Encryption for Big Data

33. Personal Threshold in a Small Scale Text-Dependent Speaker Recognition

34. On the Strong and Weak Keys in MQQ-SIG

35. How Lightweight Is the Hardware Implementation of Quasigroup S-Boxes

36. Towards a Secure Multivariate Identity-Based Encryption

37. General Sub-packetized Access-Optimal Regenerating Codes

38. Proposal for expansion of STASEC tool

39. MQQ-SIG

40. Area efficient processing element architecture for compact hash functions systems on VIRTEX5 FPGA platform

41. Comparison of the Power Consumption of the 2nd Round SHA-3 Candidates

42. Implementing the Blue Midnight Wish Hash Function on Xilinx Virtex-5 FPGA Platform

43. Resource-efficient implementation of Blue Midnight Wish-256 hash function on Xilinx FPGA platform

44. Low area FPGA and ASIC implementations of the hash function 'Blue Midnight Wish-256'

45. Low Area Implementation of the Hash Function “Blue Midnight Wish 256” for FPGA Platforms

46. The Altinn Case Study: Proposal for a Large-Scale Public-Key Biometric Infrastructure

47. High Performance Implementation of a Public Key Block Cipher - MQQ, for FPGA Platforms

48. Bypassing Data Execution Prevention on MicrosoftWindows XP SP2

49. Unbiased Random Sequences from Quasigroup String Transformations

Catalog

Books, media, physical & digital resources