2018
DOI: 10.1007/978-981-10-6890-4_62
|View full text |Cite
|
Sign up to set email alerts
|

A Modified RSA Cryptography Algorithm for Security Enhancement in Vehicular Ad Hoc Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 22 publications
0
5
0
Order By: Relevance
“…Rank Points Quality Evaluation MES V-II [9] 2 1.5 Decent DSKM [10] 0 0 Low CBC-RC5 [11] 2 1.5 Decent HCCTPWLCM [12] 2 1.5 Decent ECCGASONeC [3] 3 2 Outstanding QTL [13] 2 1.5 Decent UES-IV [14] 2 1.5 Decent LiCi 2 1.5 Decent LCSA [15] 2 1.5 Decent ESDCBE [16] 2 1.5 Decent Multiplexing AES [17] 2 1.5 Decent AES-QPSK [18] 2 1.5 Decent ECC-DA [19] 2 1.5 Decent EEM [20] 2 1.5 Decent LPRGA [21] 2 1.5 Decent LED [22] 2 1.5 Decent SECM [23] 3 2 Outstanding DCA-SNC [24] 2 1.5 Decent ECC-KM [25] 1 1 Average ECB [26] 2 1.5 Decent MR_XOR [27] 2 1.5 Decent CP-ABE [28] 2 1.5 Decent ECC-AES [29] 2 1.5 Decent MutationAES [30] 2 1.5 Decent RSA approach [31] 2 1.5 Decent MRSA [27] 2 1.…”
Section: Research Articlesmentioning
confidence: 99%
See 3 more Smart Citations
“…Rank Points Quality Evaluation MES V-II [9] 2 1.5 Decent DSKM [10] 0 0 Low CBC-RC5 [11] 2 1.5 Decent HCCTPWLCM [12] 2 1.5 Decent ECCGASONeC [3] 3 2 Outstanding QTL [13] 2 1.5 Decent UES-IV [14] 2 1.5 Decent LiCi 2 1.5 Decent LCSA [15] 2 1.5 Decent ESDCBE [16] 2 1.5 Decent Multiplexing AES [17] 2 1.5 Decent AES-QPSK [18] 2 1.5 Decent ECC-DA [19] 2 1.5 Decent EEM [20] 2 1.5 Decent LPRGA [21] 2 1.5 Decent LED [22] 2 1.5 Decent SECM [23] 3 2 Outstanding DCA-SNC [24] 2 1.5 Decent ECC-KM [25] 1 1 Average ECB [26] 2 1.5 Decent MR_XOR [27] 2 1.5 Decent CP-ABE [28] 2 1.5 Decent ECC-AES [29] 2 1.5 Decent MutationAES [30] 2 1.5 Decent RSA approach [31] 2 1.5 Decent MRSA [27] 2 1.…”
Section: Research Articlesmentioning
confidence: 99%
“…The RSA in this algorithm makes it vulnerable to attacks by Wiener and Boneh-Durfee [48]. Another encryption method is Modified Rivest-Shamir-Adleman (MRSA), which modifies the current RSA [27] with a key size of 128 bits to 1024 bits. Rather than two prime numbers, this method uses three prime numbers.…”
Section: B Rsa Based Security In Wsnmentioning
confidence: 99%
See 2 more Smart Citations
“…The proposed solution is focusing on improving the security of the cloud storage by combining RSA, AES and block-chain technique which are considered to be the most well-known algorithms in the security field. RSA is successful to guide encryption and digital signatures [20]. It gives the firstclass safety coverage by encrypting the records which is private.…”
Section: State Of the Artmentioning
confidence: 99%