PA-CRT: Chinese remainder theorem based conditional privacy-preserving authentication scheme in vehicular ad-hoc networks

J Zhang, J Cui, H Zhong, Z Chen… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
… To address such challenges, this paper proposes a novel Chinese remainder theorem (CRT)-…
Chinese remainder theorem can dynamically assist the trusted authorities (TAs) whilst …

CRT-KM: Chinese remainder theorem based key management scheme for securing ad-hoc networks

VS Janani, MSK Manikandan - 2015 IEEE International …, 2015 - ieeexplore.ieee.org
… key management since dynamic ad-hoc networks are more … is implemented using Chinese
remainder Theorem based Key-… Keywords— Chinese Remainder Theorem, mobile ad hoc

Authentication and revocation scheme for VANETs based on Chinese remainder theorem

MA Alazzawi, K Chen, AA Yassin… - 2019 IEEE 21st …, 2019 - ieeexplore.ieee.org
… Abstract— In addition to the security and privacy challenges in vehicular ad hoc network (…
authentication and group key generation via Chinese remainder theorem (CRT) as well as …

Chinese remainder theorem-based RSA-threshold cryptography in MANET using verifiable secret sharing scheme

S Sarkar, B Kisku, S Misra… - 2009 IEEE International …, 2009 - ieeexplore.ieee.org
… The proposed scheme is based on the Chinese Remainder Theorem (CRT) under the
consideration of Asmuth-… [10] CE Perkins, EM Royer, and SR Das, ”Ad hoc on demand distance …

Geometric ad-hoc routing: Of theory and practice

F Kuhn, R Wattenhofer, Y Zhang… - Proceedings of the twenty …, 2003 - dl.acm.org
… For the remainder of this section we consider geometric adhoc routing on general unit disk
graphs for super-linear cost functions. Unlike for linearly bounded cost functions, the cost of a …

CRTBA: Chinese remainder theorem-based broadcast authentication in wireless sensor networks

J Zhang, W Yu, X Liu - 2009 International Symposium on …, 2009 - ieeexplore.ieee.org
… uses the Chinese Remainder Theorm in broadcast authenticaiton in wireless sesnsor
networks. Although there are many application of Chinese Remainder Theorem in cryptography, …

A group key agreement protocol for Vanet based on Chinese remainder theorem and blockchain

H Xiao, A He - Transactions on Emerging Telecommunications …, 2024 - Wiley Online Library
… This article introduces a vehicle ad-hoc network (VANET) group key agreement protocol
based on CRT and blockchain technology. This scheme overcomes excessive reliance on TA …

Topology-transparent scheduling via the Chinese remainder theorem

YS Su - IEEE/ACM Transactions on Networking, 2014 - ieeexplore.ieee.org
… (TTS) in mobile ad hoc networks (MANETs), based on the Chinese remainder theorem (CRT). …
By the redundancy property of the Chinese remainder representation, the proposed CRT-…

[PDF][PDF] Generalizing Chinese Remainder Theorem Based Fault Tolerant Non-DHT Hierarchical Structured Peer-to-Peer Network

K Maddali, S Kaluvakuri, I Roy, Z Liu… - … Journal of Computers …, 2020 - researchgate.net
… Her research interests include wireless ad-hoc network/sensor network communication
and security, distributed computing and cloud Computing, machine learning, mobile and full-…

Application of the Chinese remainder theorem for source location privacy in wireless sensor networks

R Manjula, R Datta - 2016 IEEE Students' Technology …, 2016 - ieeexplore.ieee.org
… In this paper, we investigate an application of the Chinese Remainder Theorem (CRT) for
a novel privacy preserving routing technique in wireless sensor networks (WSNs). The …