Researchers
Veinović, Mladen
| Issue Date | Title | Author(s) | Type | Мp-cat. |
|---|---|---|---|---|
| 2017 | Information-Theoretic Analysis of Iris Biometrics for Biometric Cryptography![]() | Adamović, Saša | Article | 23M23 |
| 2016 | Fuzzy commitment scheme for generation of cryptographic keys based on iris biometrics![]() | Adamović, Saša | Article | 22M22 |
| 2016 | RAX System to Rank Arabic XML Documents![]() | Elzentani, Hesham; Veinović, Mladen | Article | Mp. category will be shown later |
| 2016 | Advancement of True Random Number Generators Based on Sound Cards Through Utilization of a New Post-processing Method![]() | Nikolic, Slavisa; Veinović, Mladen | Article | 23M23 |
| 2016 | VirtualMeshLab: Virtual Laboratory for Teaching Wireless Mesh Network![]() | Jovanović, Nenad | Article | 22M22 |
| 2016 | Biometric Verification of Maternity and Identity Switch Prevention in Maternity Wards![]() | Komlen Lalović | Article | 23M23 |
| 2016 | Implementation of DNSSEC-Secured Name Servers for ni.rs Zone and Best Practices![]() | Antic, Djordje; Veinović, Mladen | Article | 51M51 |
| 2015 | A Novel Proactive Routing Protocol in Mobile Ad Hoc Networks![]() | Dejan Tepšić; Veinović, Mladen | Article | 23M23 |
| 2015 | Classification of MANET routing protocols![]() | Tepšić, Dejan M.; Veinović, Mladen | Article | 51M51 |
| 2015 | A new way of covert communication by steganography via JPEG images within a Microsoft Word document![]() | Uljarević, Dejan; Veinović, Mladen | Article | 22M22 |
| 2014 | Mousetracking visitors to evaluate efficacy of web site design![]() | Jevremović, Aleksandar | Article | 24M24 |
| 2014 | Information technologies in knowledge economy![]() | Đorđević Boljanović, Jelena | Article | 52M52 |
| 2014 | An Interactive and Collaborative Approach to Teaching Cryptology![]() | Adamović, Saša | Article | 21M21 |
| 2014 | Managing Semi-Structured Data Using XPath, XML Trees and Tree Tuples over a Wireless Network![]() | Hesham Elzentani; Veinović, Mladen | Article | Mp. category will be shown later |
| 2013 | Safety Assessment of Android Operating Systems![]() | Miroslav Ćajić; Bogdan Brkić; Šarac, Marko | Article | 23M23 |
| 2013 | Kriptologija I : osnove za analizu i sintezu šifarskih sistema![]() | Mladen Veinović | Article | Mp. category will be shown later |
| 2013 | Upload Traffic over TCP and UDP Protocols in Different Security Algorithms in Wireless Network | Veinović, Mladen | Article | Mp. category will be shown later |
| 2013 | Veb 2.0 tehnologije u službi menadžmenta znanja![]() | Mladen Opačić; Veinović, Mladen | Article | 51M51 |
| 2013 | Napadi na IEEE 802.11 bežične mreže![]() | Dejan Tepšić; Veinović, Mladen | Article | 51M51 |
| 2012 | Quantification of the Different Security Algorithms in Wireless Network![]() | Abdala Gheryani; Veinović, Mladen | Article | Mp. category will be shown later |
