On modular (CRT-based) secret sharing

NN Shenets - Journal of Computer Virology and Hacking Techniques, 2024 - Springer
Secret sharing scheme (SSS) allows to share some secret s among n parties in such a way
that only certain subsets of them can recover the secret. The first SSSs were independently …

[PDF][PDF] 鲁棒的闭式中国余数定理及其在欠采样频率估计中的应用

王文杰, 李小平 - 信号处理, 2013 - signal.ejournal.org.cn
中国余数定理在数字信号处理等领域有着广泛的应用. 传统的中国余数定理要求待恢复的数及
余数都为整数, 且对噪声极其敏感. 为了在余数含有误差时鲁棒的恢复原来的数 …

Protocol for secure and reliable data transmission in MANET based on modular arithmetic

M Deryabin, M Babenko, A Nazarov… - … on Engineering and …, 2019 - ieeexplore.ieee.org
Mobile Ad-Hoc Networks is gaining ground due to the proliferation of simple low-power
devices and the introduction of the concepts of the Internet of Things, smart city, and smart …

A game theoretic framework for stochastic multipath routing in self-organized MANETs

S Sarkar, R Datta - Pervasive and Mobile Computing, 2017 - Elsevier
In this paper we propose a game theoretic framework for stochastic multipath routing in
mobile ad hoc networks (MANETs). In a MANET, intelligent and adaptive attackers may try to …

The New Equation for RSA's Decryption Process Appropriate with High Private Key Exponent

K Somsuk - 2017 21st International Computer Science and …, 2017 - ieeexplore.ieee.org
RSA is the best well-known public key cryptography using a pair of keys for encryption and
decryption process. Usually, the private key is generated higher than public key to avoid …

[PDF][PDF] Secure routing scheme in MANETs using secret key sharing

A Amuthan, BA Baradwaj - International Journal of Computer Applications, 2011 - Citeseer
ABSTRACT A Mobile Ad-hoc NETwork (MANETs) follows a dynamic topology with
distributed architecture. MANETs has no basic infrastructure also has no fixed access point …

Trust and resource oriented communication scheme in mobile ad hoc networks

BUI Khan, RF Olanrewaju, RN Mir, SH Yusoff… - Intelligent Systems and …, 2018 - Springer
Attaining high security in mobile ad hoc networks (or MANETs) is the utmost concern in the
present era of wireless ad-hoc communication and efforts are continuously being made by …

Euler totient function and fermat Euler theorem based an optimized key management scheme for securing mobile agents migration

P Kumar, N Singhal, D Pandey - International Journal of Information …, 2022 - Springer
As the mobile agents move automatically on distributed networks, the security of agents and
platforms is of prime concern. Over the year's mobile agents-based software applications …

Authentication in dynamic peer-to-peer networks based on homomorphic secret sharing

NN Shenets - Automatic Control and Computer Sciences, 2017 - Springer
We have proposed a new method for authentication and secret key establishment in ad-hoc
networks through public channels based only on verifiable homomorphic threshold secret …

[PDF][PDF] RSRP: a robust secure routing protocol in MANET

D Sinha, U Bhattacharya, R Chaki - Foundations of computing and …, 2014 - sciendo.com
In this paper, we propose a novel algorithm RSRP to build a robust secure routing protocol
in mobile ad-hoc networks (MANETs). This algorithm is based on some basic schemes such …