Euler Totient Function and Fermat-Eulller Theorem Based on Optimized Key Management Scheme for Securing Mobile Agents Migration

N Singhal, P Kumar, D Pandey - Electronic Systems and Intelligent …, 2022 - Springer
As mobile agents move automatically on distributed networks, the security of agents and
platforms is of prime concern. Over the years, mobile agents-based software applications …

A modified RSA cryptography algorithm for security enhancement in vehicular ad hoc networks

D Roy, P Das - Proceedings of the International Conference on …, 2018 - Springer
Secure the communication over network is an important task. Security of Vehicular Ad hoc
Networks (VANET) is prime concern due to the numbers of attacker's existence. We can …

[PDF][PDF] A CRT based encryption methodology for secure communication in MANET

D Sinha, U Bhattacharya, R Chaki - International Journal of …, 2012 - academia.edu
MANETs are well known for their flexibility and ease of communication. The communication
is purely based on trust, without any need of authentication. This often leads to insecure …

[PDF][PDF] Multilevel threshold secret image sharing based on the Chinese remainder theorem

R Koikara, A Paul, KY Yoo - … on Security and Management (SAM'16), 2016 - academia.edu
(t, n)-threshold secret sharing was first introduced by Shamir and Blakley separately in 1979.
Apart from this, there are threshold secret sharing schemes which use the Chinese …

CRT-KM: Chinese remainder theorem based key management scheme for securing ad-hoc networks

VS Janani, MSK Manikandan - 2015 IEEE International …, 2015 - ieeexplore.ieee.org
Providing security for Dynamic Cluster based Mobile Ad-hoc networks (MANET) is a vital
task to improve network security with less compromising mobility and with reduced …

Аутентификация в динамических одноранговых сетях на основе гомоморфного разделения секрета

НН Шенец - Проблемы информационной безопасности …, 2017 - elibrary.ru
Предложен новый метод аутентификации и выработки общего ключа в ad-hoc сетях с
использованием только проверяемого гомоморфного порогового разделения секрета в …

[PDF][PDF] A Novel Lightweight Multi-secret Sharing Technique for Mobile Adhoc Networks

G Polymerou, EA Panaousis, E Pfluegel… - Proc. of the 29th …, 2012 - researchgate.net
In this paper, we are concerned with security for Mobile Ad-hoc Networks (MANETs). Due to
the decentralized and self-organizing MANET nature, which implies no direct trusted …

Implementing RSA algorithm for fully distributed certificate authority in MANET

A Alomari - Journal of Information Systems & Operations …, 2013 - go.gale.com
Mobile wireless ad hoc networks that are resistant to impersonating nodes are necessary for
distributed systems used in security applications. Many secure protocols in mobile ad hoc …

[PDF][PDF] On the Algorithms Related to Threshold Cryptography Based Network Protocols.

Q Duan, M Virendra - Int. J. Netw. Secur., 2013 - Citeseer
In this paper we analyzed the algorithms related to threshold cryptography based protocols
in networks security. We showed the hardness of threshold minimum cut problem, revealed …

[PDF][PDF] Code based secret sharing scheme for MANET

P Guddeti, PVS Kumar, AN Tentu - Indian Journal of Science and …, 2016 - researchgate.net
Secret values sharing in MANET is computationally insecure and inconsistent because of its
dynamic nature. Shamirs proposal is well known prominent secret sharing schemes. But it …