Enhancing secrecy using hybrid elliptic curve cryptography and Diffie Hellman key exchange approach and Young's double slit experiment optimizer based optimized cross layer in multihop wireless network
Wireless Network is usually a non-infrastructure multi-hop network, in which the communication between the nodes are carried implicitly or explicitly with the help of intermediate nodes. The two primary considerations when creating a wireless network are energy efficiency and secrecy, which are curr...
| Published in: | Measurement: Sensors |
|---|---|
| Main Authors: | Bhagappa, H.S. Divyashree, N. Avinash, B.N. Manjunatha, J. Vishesh, M. Mamatha |
| Format: | Article |
| Language: | English |
| Published: |
Elsevier
2024-02-01
|
| Subjects: | |
| Online Access: | http://www.sciencedirect.com/science/article/pii/S2665917423003033 |
Similar Items
Proposal to Complex DES Security Using Diffie Hellman Injection
by: Shatha habeeb Jafar
Published: (2011-04-01)
by: Shatha habeeb Jafar
Published: (2011-04-01)
Computationally sound mechanized proofs for Diffie-Hellman key exchange protocols
by: FENG Chao, et al.
Published: (2011-01-01)
by: FENG Chao, et al.
Published: (2011-01-01)
Computationally sound mechanized proofs for Diffie-Hellman key exchange protocols
by: FENG Chao, et al.
Published: (2011-01-01)
by: FENG Chao, et al.
Published: (2011-01-01)
Diffie-Hellman Key Exchange through Steganographied Images
by: Amine Khaldi
Published: (2018-05-01)
by: Amine Khaldi
Published: (2018-05-01)
Public Key Cipher with Signature Based on Diffie-Hellman and the Magic Square Problem
by: Abdul S.Rahma, et al.
Published: (2016-01-01)
by: Abdul S.Rahma, et al.
Published: (2016-01-01)
An edge cloud and Fibonacci-Diffie-Hellman encryption scheme for secure printer data transmission
by: Yiqin Bao, et al.
Published: (2024-01-01)
by: Yiqin Bao, et al.
Published: (2024-01-01)
BCDH: Blockchain-based covert Diffie-Hellman key exchange scheme
by: Qinghua Hu, et al.
Published: (2025-10-01)
by: Qinghua Hu, et al.
Published: (2025-10-01)
Two-way and anonymous heterogeneous signcryption scheme between PKI and IBC
by: Cai-fen WANG, et al.
Published: (2017-10-01)
by: Cai-fen WANG, et al.
Published: (2017-10-01)
Two-way and anonymous heterogeneous signcryption scheme between PKI and IBC
by: Cai-fen WANG, et al.
Published: (2017-10-01)
by: Cai-fen WANG, et al.
Published: (2017-10-01)
Triple receiver public key encryption cryptosystem
by: Liutao ZHAO, et al.
Published: (2020-12-01)
by: Liutao ZHAO, et al.
Published: (2020-12-01)
Triple receiver public key encryption cryptosystem
by: ZHAO Liutao, WANG Caiqun, et al.
Published: (2020-12-01)
by: ZHAO Liutao, WANG Caiqun, et al.
Published: (2020-12-01)
Proxy Re-Encryption Scheme Supporting Keyword Search in Email System
by: NIU Shufen, CHEN Lixia, LIU Wenke, WANG Caifen, DU Xiaoni
Published: (2020-06-01)
by: NIU Shufen, CHEN Lixia, LIU Wenke, WANG Caifen, DU Xiaoni
Published: (2020-06-01)
D(HE)at: A Practical Denial-of-Service Attack on the Finite Field Diffie–Hellman Key Exchange
by: Szilard Pfeiffer, et al.
Published: (2024-01-01)
by: Szilard Pfeiffer, et al.
Published: (2024-01-01)
An image encryption method based on modified elliptic curve Diffie-Hellman key exchange protocol and Hill Cipher
by: Hadi Hiba Hilal, et al.
Published: (2024-03-01)
by: Hadi Hiba Hilal, et al.
Published: (2024-03-01)
A Secure Medical Image Transmission System Based On 2D Logistic Map and Diffie-Hellman Key Exchange Mechanisms
by: Shakhawan H. Wady, et al.
Published: (2022-10-01)
by: Shakhawan H. Wady, et al.
Published: (2022-10-01)
A New Short Signature Scheme with Random Oracle from Bilinear Pairings
by: Sedat Akleylek, et al.
Published: (2023-06-01)
by: Sedat Akleylek, et al.
Published: (2023-06-01)
Encrypted Image Watermark in Audio Files Using Homogenous Deffie-Hellman with Chebyshev Polynomial
by: Hala B. Abdul Wahab, et al.
Published: (2016-06-01)
by: Hala B. Abdul Wahab, et al.
Published: (2016-06-01)
Publicly Verifiable Multi-stage Secret Sharing on General Access Structures
by: SONG Yun, WANG Ningning, XIAO Menglin, SHAO Zhiyi
Published: (2023-05-01)
by: SONG Yun, WANG Ningning, XIAO Menglin, SHAO Zhiyi
Published: (2023-05-01)
ADDING PERFECT FORWARD SECRECY TO KERBEROS
by: Wameedh Nazar Flayyih
Published: (2010-04-01)
by: Wameedh Nazar Flayyih
Published: (2010-04-01)
Universally composable secure multiparty computation protocol with fairness
by: You-liang TIAN, et al.
Published: (2014-02-01)
by: You-liang TIAN, et al.
Published: (2014-02-01)
Universally composable secure multiparty computation protocol with fairness
by: You-liang TIAN, et al.
Published: (2014-02-01)
by: You-liang TIAN, et al.
Published: (2014-02-01)
Multi-server conjunctive keyword searchable encryption scheme based on BDH problem
by: Yanhua LU, et al.
Published: (2020-02-01)
by: Yanhua LU, et al.
Published: (2020-02-01)
Multi-server conjunctive keyword searchable encryption scheme based on BDH problem
by: Yanhua LU, et al.
Published: (2020-02-01)
by: Yanhua LU, et al.
Published: (2020-02-01)
ID-based transitive signature schemes without random oracle
by: MA Xiao-long1, et al.
Published: (2010-01-01)
by: MA Xiao-long1, et al.
Published: (2010-01-01)
ID-based transitive signature schemes without random oracle
by: MA Xiao-long1, et al.
Published: (2010-01-01)
by: MA Xiao-long1, et al.
Published: (2010-01-01)
Data Sharing Scheme of Electronic Medical Record Based on Proxy Re-Encryption
by: NIU Shufen, LIU Wenke, CHEN Lixia, DU Xiaoni
Published: (2021-06-01)
by: NIU Shufen, LIU Wenke, CHEN Lixia, DU Xiaoni
Published: (2021-06-01)
Efficient certificateless sequential multi-signature scheme
by: Yan-lin QIN, et al.
Published: (2013-07-01)
by: Yan-lin QIN, et al.
Published: (2013-07-01)
Efficient certificateless sequential multi-signature scheme
by: Yan-lin QIN, et al.
Published: (2013-07-01)
by: Yan-lin QIN, et al.
Published: (2013-07-01)
Efficient ID-based certificateless signature scheme
by: LIU Jing-wei, et al.
Published: (2008-01-01)
by: LIU Jing-wei, et al.
Published: (2008-01-01)
Efficient ID-based certificateless signature scheme
by: LIU Jing-wei, et al.
Published: (2008-01-01)
by: LIU Jing-wei, et al.
Published: (2008-01-01)
Developed Protocol for Key Exchange Based on Irreducible Polynomial
by: Abdul Monem S. Rahma, et al.
Published: (2012-06-01)
by: Abdul Monem S. Rahma, et al.
Published: (2012-06-01)
SIDH Hybrid Schemes with Classical Component Based on the Discrete Logarithm Problem over Finite Field Extension
by: Michał Wroński, et al.
Published: (2020-09-01)
by: Michał Wroński, et al.
Published: (2020-09-01)
Binary Tree Based Forward Secure Signature Scheme in the Random Oracle Model
by: Mariusz Jurkiewicz
Published: (2021-12-01)
by: Mariusz Jurkiewicz
Published: (2021-12-01)
COMPARATIVE ANALYSIS OF MOD-ECDH ALGORITHM WITH VARIOUS ALGORITHMS
by: O Sri Nagesh, et al.
Published: (2020-06-01)
by: O Sri Nagesh, et al.
Published: (2020-06-01)
Advanced Cryptography Using Nanoantennas in Wireless Communication
by: Francisco Alves, et al.
Published: (2025-08-01)
by: Francisco Alves, et al.
Published: (2025-08-01)
A Practical Searchable Encryption Scheme Based on Connection Keywords
by: LUO Yunpeng, ZHU Nitong, MAO Ciwei, CHENG Jinxue, XU Chungen
Published: (2020-02-01)
by: LUO Yunpeng, ZHU Nitong, MAO Ciwei, CHENG Jinxue, XU Chungen
Published: (2020-02-01)
A Pairing Free Provable Public Key Dual Receiver Encryption Scheme
by: Eman Abouelkheir, et al.
Published: (2024-01-01)
by: Eman Abouelkheir, et al.
Published: (2024-01-01)
Verifiable attribute-based keyword search scheme over encrypted data for personal health records in cloud
by: Yuqin Sun, et al.
Published: (2023-05-01)
by: Yuqin Sun, et al.
Published: (2023-05-01)
New sequences from the generalized Pell p−numbers and mersenne numbers and their application in cryptography
by: Elahe Mehraban, et al.
Published: (2024-04-01)
by: Elahe Mehraban, et al.
Published: (2024-04-01)
A mutual and anonymous heterogeneous signcryption scheme between PKI and IBC
by: Huifang JI, et al.
Published: (2020-04-01)
by: Huifang JI, et al.
Published: (2020-04-01)
Similar Items
-
Proposal to Complex DES Security Using Diffie Hellman Injection
by: Shatha habeeb Jafar
Published: (2011-04-01) -
Computationally sound mechanized proofs for Diffie-Hellman key exchange protocols
by: FENG Chao, et al.
Published: (2011-01-01) -
Computationally sound mechanized proofs for Diffie-Hellman key exchange protocols
by: FENG Chao, et al.
Published: (2011-01-01) -
Diffie-Hellman Key Exchange through Steganographied Images
by: Amine Khaldi
Published: (2018-05-01) -
Public Key Cipher with Signature Based on Diffie-Hellman and the Magic Square Problem
by: Abdul S.Rahma, et al.
Published: (2016-01-01)
