2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS) 2016
DOI: 10.1109/icaccs.2016.7586356
|View full text |Cite
|
Sign up to set email alerts
|

Hybrid cryptography mechanism for securing self-organized wireless networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
4
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 8 publications
0
4
0
Order By: Relevance
“…The findings of [15][16][17] and [22] had further been improved by the intrusion detection approach called EAACK with AES, RSA and DSA [23] resulting in securing packets, routing protocols and keys. Another approach [24] for securing MANET using RSA, AES and SHA-256 along with EAACK had been proposed which has provided security to the nodes, routing protocols and packets transferred.…”
Section: Role Of Cryptographic Algorithms In Mobile Admentioning
confidence: 99%
“…The findings of [15][16][17] and [22] had further been improved by the intrusion detection approach called EAACK with AES, RSA and DSA [23] resulting in securing packets, routing protocols and keys. Another approach [24] for securing MANET using RSA, AES and SHA-256 along with EAACK had been proposed which has provided security to the nodes, routing protocols and packets transferred.…”
Section: Role Of Cryptographic Algorithms In Mobile Admentioning
confidence: 99%
“…Moreover, these schemes also applied in different application such as email [53], short message service (SMS) [54] and cloud computing [55]. Hybrid algorithm basically provide the integration between public key cryptography and private key cryptography schemes [56][57][58][59][60][61]; between public key cryptography schemes [62] or between private key cryptography schemes [63]. Most of the schemes in Hybrid algorithm were focused on security and, security and speed because of the integration of different cryptography schemes will strengthen the security mechanism by combining the strengths of encryption of each form [58], [60], [63].…”
Section: Figure 1 Public Key Cryptography Algorithms Classificationmentioning
confidence: 99%
“…Hybrid algorithm basically provide the integration between public key cryptography and private key cryptography schemes [56][57][58][59][60][61]; between public key cryptography schemes [62] or between private key cryptography schemes [63]. Most of the schemes in Hybrid algorithm were focused on security and, security and speed because of the integration of different cryptography schemes will strengthen the security mechanism by combining the strengths of encryption of each form [58], [60], [63]. However, hybrid cryptography schemes have extra steps on encryption and decryption which give impact to the time required [62] and may contain problems on efficient computation and powerful encoding systems [56].…”
Section: Figure 1 Public Key Cryptography Algorithms Classificationmentioning
confidence: 99%
See 1 more Smart Citation