Danilo Gligoroski
Background and activities
Courses
- TTM4502 - Communication Technology, Specialization Project
- TTM4905 - Communication Technology, Master's Thesis
- TTM4536 - Advanced Ethical Hacking - Information Security, Specialization Course
- TM8111 - Identity-Based Cryptography
Scientific, academic and artistic work
A selection of recent journal publications, artistic productions, books, including book and report excerpts. See all publications in the database
Journal publications
- (2021) Medical students' perceptions of a blockchain-based decentralized work history and credentials portfolio: Qualitative feasibility study. JMIR Formative Research. vol. 5 (10).
- (2021) Blockchain for increased trust in virtual health care: Proof-of-concept study. Journal of Medical Internet Research. vol. 23 (7).
- (2020) GDPR Compliant Blockchain and Distributed Ledger Technologies in the Health Sector. Studies in Health Technology and Informatics. vol. 270.
- (2019) Expanded Combinatorial Designs as Tool to Model Network Slicing in 5G. IEEE Access. vol. 7.
- (2019) Network Traffic Driven Storage Repair. International Journal of Big Data Intelligence. vol. 6 (3/4).
- (2019) Blockchain in healthcare and health sciences—A scoping review. International Journal of Medical Informatics. vol. 134:104040.
- (2019) SoK of Used Cryptography in Blockchain. IEEE Access. vol. 7.
- (2018) HashTag Erasure Codes: From Theory to Practice. IEEE Transactions on Big Data. vol. 4 (4).
- (2017) CARIBE: Cascaded IBE for maximum flexibility and user-side control. Lecture Notes in Computer Science (LNCS). vol. 10311 LNCS.
- (2017) Quadratic permutation polynomials, complete mappings and mutually orthogonal latin squares. Mathematica Slovaca. vol. 67 (5).
- (2016) “A 16-bit reconfigurable encryption processor for Pi-Cipher“. Proceedings, International Parallel and Distributed Processing Symposium (IPDPS).
- (2016) Semantic security and key-privacy with random split of St-Gen codes. Lecture Notes in Computer Science (LNCS). vol. 9709.
- (2016) General Sub-Packetized Access-Optimal Regenerating Codes. IEEE Communications Letters. vol. 20 (7).
- (2016) Reviving the idea of incremental cryptography for the zettabyte Era use case: Incremental hash functions based on SHA-3. Lecture Notes in Computer Science (LNCS). vol. 9591.
- (2016) An encryption scheme based on Random Split of St-Gen codes. IEEE International Symposium on Information Theory. Proceedings. vol. 2016-August.
- (2014) On the error detection capability of one check digit. IEEE Transactions on Information Theory. vol. 60 (1).
- (2014) CryptoCloak application - main idea, an overview and improvement proposal. Norsk Informasjonssikkerhetskonferanse (NISK).
- (2013) Balanced XOR-ed Coding. Lecture Notes in Computer Science (LNCS). vol. 8115.
- (2013) On a special class of multivariate quadratic quasigroups (MQQs). Journal of Mathematical Cryptology. vol. 7 (2).
- (2012) On some properties of a check digit system. IEEE International Symposium on Information Theory. Proceedings.