Papers |
A Constrained Approximate Search Scenario for Intrusion Detection in Hosts and Networks
Slobodan Petrović
|
Time-Memory Trade-Off in RFID Systems
Violeta Tomašević, Milo Tomašević
|
The Attacks on the RSA Algorithm
Dragan Savić, Slobodan Damjanović
|
On Mitigation of Modern Cybercrime Threats
Miloš Jovanović, Nikola Rančić, David Davidović, Dragan Mitić
|
New Trends of Biometric Systems Based on Fingerprint
Edin Ćatović, Saša Adamović
|
Upgrading and Securing External Domain Space in the City of Niš Administration Infrastructure
Đorđe Antić, Mladen Veinović
|
Privileged Identities - Threat to Network and Data Security
Dunja Pešić, Mladen Veinović
|
Biometrics as an Intelligent Part of the B2C Environment
Milomir Tatović, Saša Adamović, Milan Milosavljević
|
An Overview of Steganographic Techniques and Methods Applied on Jpeg Images Using Different Transformational Techniques
Dejan Uljarević, Vladan Pantović, Aleksandar Mišković, Nataša Aleksić
|
Methods and Tools for Plagiarism Detection in Arabic Documents
Intisar Abakush
|
Checking Correctness of Hardware RNG Architecture Specifications
Igor Fermevc, Saša Adamović
|