Jovan Dj. Golic
According to our database1,
Jovan Dj. Golic
authored at least 104 papers
between 1987 and 2013.
Collaborative distances:
Collaborative distances:
Timeline
1990
1995
2000
2005
2010
0
1
2
3
4
5
6
7
8
9
10
1
1
1
2
2
2
3
3
3
2
3
4
4
7
3
2
4
1
1
1
2
1
1
4
2
2
1
1
3
3
1
3
1
3
4
5
5
4
1
3
2
2
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2013
Key Agreement over a Generalized Multiple Access Channel Using Noiseless and Noisy Feedback.
IEEE J. Sel. Areas Commun., 2013
Proceedings of the Sustainable Internet and ICT for Sustainability, 2013
Proceedings of the Topics in Cryptology - CT-RSA 2013, 2013
2012
2011
2009
Moving dispersion method for statistical anomaly detection in intrusion detection systems.
ISC Int. J. Inf. Secur., 2009
2008
IEEE Trans. Inf. Theory, 2008
IACR Cryptol. ePrint Arch., 2008
2007
IEEE Trans. Circuits Syst. I Regul. Pap., 2007
Proceedings of the Cryptographic Hardware and Embedded Systems, 2007
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007
2006
IEEE Trans. Inf. Theory, 2006
IEEE Trans. Inf. Theory, 2006
IEEE Trans. Computers, 2006
2005
IEEE Trans. Inf. Theory, 2005
Proceedings of the Information Security and Cryptology, 2005
2004
IACR Cryptol. ePrint Arch., 2004
Proceedings of the Fast Software Encryption, 11th International Workshop, 2004
2003
J. Cryptol., 2003
IACR Cryptol. ePrint Arch., 2003
Proceedings of the Selected Areas in Cryptography, 10th Annual International Workshop, 2003
Proceedings of the Fast Software Encryption, 10th International Workshop, 2003
Proceedings of the Cryptographic Hardware and Embedded Systems, 2003
2002
Computation of Edit Probabilities and Edit Distances for the A5-Type Keystream Generator.
J. Complex., 2002
Analysis of a measure of correlation between two binary strings of different lengths.
Australas. J Comb., 2002
Proceedings of the Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28, 2002
Proceedings of the Cryptographic Hardware and Embedded Systems, 2002
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002
2001
IEEE Trans. Inf. Theory, 2001
Edit distances and probabilities for correlation attacks on clock-controlled combiners with memory.
IEEE Trans. Inf. Theory, 2001
Inf. Process. Lett., 2001
Proceedings of the Advances in Cryptology, 2001
2000
IEEE Trans. Inf. Theory, 2000
IEEE Trans. Inf. Theory, 2000
IEEE Trans. Computers, 2000
Proceedings of the Selected Areas in Cryptography, 7th Annual International Workshop, 2000
Proceedings of the Selected Areas in Cryptography, 7th Annual International Workshop, 2000
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000
1999
IEEE Trans. Inf. Theory, 1999
IEEE Trans. Inf. Theory, 1999
Inversion Attack and Branching.
Aust. Comput. J., 1999
Proceedings of the Cryptography and Coding, 1999
1998
IEEE Trans. Inf. Theory, 1998
Proceedings of the Sequences and their Applications, 1998
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998
1997
Stat. Comput., 1997
Proceedings of the Advances in Cryptology, 1997
Proceedings of the Advances in Cryptology, 1997
Proceedings of the Advances in Cryptology, 1997
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997
1996
IEEE Trans. Computers, 1996
SIAM J. Discret. Math., 1996
Proceedings of the Fast Software Encryption, 1996
Proceedings of the Fast Software Encryption, 1996
Proceedings of the Advances in Cryptology, 1996
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996
1995
Proceedings of the Advances in Cryptology, 1995
Proceedings of the Cryptography: Policy and Algorithms, 1995
Proceedings of the Cryptography: Policy and Algorithms, 1995
Proceedings of the Cryptography: Policy and Algorithms, 1995
Proceedings of the Cryptography: Policy and Algorithms, 1995
1994
Proceedings of the Fast Software Encryption: Second International Workshop. Leuven, 1994
Proceedings of the Advances in Cryptology, 1994
Proceedings of the Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28, 1994
Proceedings of the Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28, 1994
1993
Proceedings of the Fast Software Encryption, 1993
1992
Convergence of a Bayesian Iterative Error-Correction Procedure on a Noisy Shift register Sequence.
Proceedings of the Advances in Cryptology, 1992
Proceedings of the Advances in Cryptology, 1992
Proceedings of the Advances in Cryptology, 1992
1991
A Generalized Correlation Attack on a Class of Stream Ciphers Based on the Levenshtein Distance.
J. Cryptol., 1991
Proceedings of the Advances in Cryptology, 1991
Proceedings of the Advances in Cryptology, 1991
1990
Correction to 'A lower bound on the redundancy of D-ary Huffman codes' (Nov 87 910-911).
IEEE Trans. Inf. Theory, 1990
IEEE Trans. Inf. Theory, 1990
A Noisy Clock-Controlled Shift Register Cryptanalysis Concept Based on Sequence Comparion Approach.
Proceedings of the Advances in Cryptology, 1990
A Fast Iterative Algorithm For A Shift Register Initial State Reconstruction Given The Nosiy Output Sequence.
Proceedings of the Advances in Cryptology, 1990
1989
IEEE Trans. Inf. Theory, 1989
1988
IEEE Trans. Inf. Theory, 1988
1987
IEEE Trans. Inf. Theory, 1987
On the relationship between the separability measures and the Bayes probability of error.
IEEE Trans. Inf. Theory, 1987
On the relationship between the information measures and the Bayes probability of error.
IEEE Trans. Inf. Theory, 1987
On the relationship between the efficiency measures of multicategory information systems.
IEEE Trans. Inf. Theory, 1987