Euler totient function and fermat Euler theorem based an optimized key management scheme for securing mobile agents migration

P Kumar, N Singhal, D Pandey - International Journal of Information …, 2022 - Springer
… The cryptographic condition is hidden through number of threshold and secret key divided
among number of shares. For the security of mobile agent an approach based on Euler totient …

Euler Totient Function and Fermat-Eulller Theorem Based on Optimized Key Management Scheme for Securing Mobile Agents Migration

N Singhal, P Kumar, D Pandey - Electronic Systems and Intelligent …, 2022 - Springer
… Sarkar S, Kisku B, Misra S, Obaidat MS (2009) Chinese remainder theorem-based RSA-threshold
cryptography in MANET using verifiable secret sharing scheme. In: WiMob 2009—5th …

Multi-image steganography and authentication using crypto-stego techniques

H Sharma, DC Mishra, RK Sharma, N Kumar - Multimedia Tools and …, 2021 - Springer
… Sarkar S, Kisku B, Misra S, Obaidat MS (2009) Chinese remainder theorem-based rsa-threshold
cryptography in MANET using verifiable secret sharing scheme. In: 2009 IEEE …

An approach for optimal-secure multi-path routing and intrusion detection in MANET

N Veeraiah, BT Krishna - Evolutionary Intelligence, 2022 - Springer
… Sarkar S, Kisku B, Misra S, Obaidat MS (2009) Chinese remainder theorem based RSA-threshold
cryptography in mobile ad hoc networks using verifiable secret sharing. In: …