Natasa Zivic

Orcid: 0000-0002-1898-201X

According to our database1, Natasa Zivic authored at least 42 papers between 2008 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
A Smart Parking Solution by Integrating NB-IoT Radio Communication Technology into the Core IoT Platform.
Future Internet, 2022

The transitional phase of Boost.Asio and POCO C++ networking libraries towards IPv6 and IoT networking security.
Proceedings of the IEEE International Conference on Smart Internet of Things, 2022

2020
Iterative self-correction for secured images using turbo codes and soft input decryption.
J. Intell. Fuzzy Syst., 2020

2019
Distributed Ledger Technologies for M2M Communications.
Proceedings of the 33rd International Conference on Information Networking, 2019

2018
Medical Images Analysis in Cancer Diagnostic.
CoRR, 2018

Cognition for enhanced biometrie authentication.
Proceedings of the 2018 International Conference on Information Networking, 2018

2017
Smart grid security - an overview of standards and guidelines.
Elektrotech. Informationstechnik, 2017

Two-Phase Method for Image Authentication and Enhanced Decoding.
IEEE Access, 2017

Discrete Wavelet Transform based Watermarking for Image Content Authentication.
Proceedings of the 6th International Conference on Pattern Recognition Applications and Methods, 2017

Iterative algorithm for OFDM transmission over Rayleigh channels.
Proceedings of the 2017 International Conference on Information Networking, 2017

A Robust Watermarking Technique for Image Content Authentication.
Proceedings of the Communication Papers of the 2017 Federated Conference on Computer Science and Information Systems, 2017

2016
QoS-Aware Dynamic MAP Selection in HMIPv6 Architectures.
IEEE Access, 2016

Perceptual image hashing using SVD based Noise Resistant Local Binary Pattern.
Proceedings of the 8th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2016

Content based image authentication with error correction.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

2015
Secure and Robust Two-Phase Image Authentication.
IEEE Trans. Multim., 2015

Implementation of a HMIPv6 extension in the INET and xMIPv6 simulation framework with dynamic MAP discovery for OMNeT 4.x.
Proceedings of the 38th International Convention on Information and Communication Technology, 2015

Secure Design Patterns for Security in Smart Metering Systems.
Proceedings of the 2015 IEEE European Modelling Symposium, 2015

2014
Soft decision iterative error and erasure decoder for Reed-Solomon codes.
IET Commun., 2014

Revisiting a primitive: Analysis of approximate message authentication codes.
Proceedings of the IEEE International Conference on Communications, 2014

2013
Principles of Soft Verification.
Int. J. Distributed Syst. Technol., 2013

Information security in noisy environments.
Proceedings of the 2nd Mediterranean Conference on Embedded Computing, 2013

AACI: The mechanism for approximate authentication and correction of images.
Proceedings of the IEEE International Conference on Communications, 2013

Reliability of Soft Verification of Message Authentication Codes.
Proceedings of the Fifth International Conference on Computational Intelligence, 2013

2012
On Joint Cryptographic Verification and Channel Decoding via the Maximum Likelihood Criterion.
IEEE Commun. Lett., 2012

Security Aspects of Soft Verified Messages Protected by Message Authentication Codes.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Introducing soft verification as an improvement of hard verification of cryptographic check values.
Proceedings of the 35th IEEE Sarnoff Symposium 2012, Newark, NJ, USA, May 21-22, 2012, 2012

Soft Input Trust Output.
Proceedings of the 2012 IEEE RIVF International Conference on Computing & Communication Technologies, Research, Innovation, and Vision for the Future (RIVF), Ho Chi Minh City, Vietnam, February 27, 2012

Iterative method for correction of messages protected by symmetric cryptographic check values.
Proceedings of the 2012 International Conference on Information Networking, 2012

Iterative Cross-layer Decoder for WiMAX Using Hybrid-ARQ.
Proceedings of the 14th IEEE International Conference on High Performance Computing and Communication & 9th IEEE International Conference on Embedded Software and Systems, 2012

Noise tolerant image authentication with error localization and correction.
Proceedings of the 50th Annual Allerton Conference on Communication, 2012

2011
Iterative enhanced packet combining over hybrid-ARQ.
Proceedings of the 8th International Symposium on Wireless Communication Systems, 2011

Multi-layer data protection using N-Channel stop-and-wait Hybrid-ARQ in WiMAX.
Proceedings of the 16th IEEE Symposium on Computers and Communications, 2011

Trust in corrected messages protected by message authentication codes.
Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies, 2011

Error Correcting and Weighted Noise Tolerant Message Authentication Codes.
Proceedings of the 5th International Conference on Signal Processing and Communication Systems, 2011

Iterative Bit Flip Type-II Hybrid-ARQ Scheme for Wireless Networks.
Proceedings of the European Wireless 2011, April 27-29, 2011, Vienna, Austria., 2011

Soft correction and verification of the messages protected by cryptographic check values.
Proceedings of the 45st Annual Conference on Information Sciences and Systems, 2011

Improvement of Concatenated Decoding Using Bit-Stuffing.
Proceedings of the 2011 International Conference on Broadband, 2011

2010
Iterative method for improvement of coding and decryption
CoRR, 2010

Security Architecture of Smart Metering Systems.
Proceedings of the Software Services for e-World, 2010

2009
Strategies and performances of Soft Input Decryption
CoRR, 2009

Mathematical optimization of decrypting algorithm for soft input decryption.
Proceedings of the XXII International Symposium on Information, 2009

2008
Joint channel coding and cryptography.
PhD thesis, 2008


  Loading...