{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T04:05:48Z","timestamp":1748837148183,"version":"3.41.0"},"publisher-location":"Singapore","reference-count":19,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811004476"},{"type":"electronic","value":"9789811004483"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-981-10-0448-3_86","type":"book-chapter","created":{"date-parts":[[2016,3,19]],"date-time":"2016-03-19T03:34:03Z","timestamp":1458358443000},"page":"1027-1036","source":"Crossref","is-referenced-by-count":1,"title":["Enhancement of Mobile Ad Hoc Network Security Using Improved RSA Algorithm"],"prefix":"10.1007","author":[{"given":"S. C.","family":"Dutta","sequence":"first","affiliation":[]},{"family":"Sudha Singh","sequence":"additional","affiliation":[]},{"given":"D. K.","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,15]]},"reference":[{"key":"86_CR1","unstructured":"Muthy, C.S.R., Manoj, B.S.: Adhoc Wireless Network Architecture and Protocols, 20th edn. Pearson Education Inc. (2014)"},{"key":"86_CR2","unstructured":"Stallings, W.: Cryptography and network security, 4th edn., Tenth impression. Pearson education Inc. (2011)"},{"key":"86_CR3","doi-asserted-by":"crossref","unstructured":"Difie, W., Hellman, M.: Multiuser cryptographic techniques. IEEE Trans. Inf. Theory (1976)","DOI":"10.1145\/1499799.1499815"},{"issue":"2","key":"86_CR4","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. L. Rivest","year":"1978","unstructured":"Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public key cryptosystems. Commun. ACM 21(2), 120\u2013126 (1978)","journal-title":"Communications of the ACM"},{"key":"86_CR5","doi-asserted-by":"crossref","unstructured":"Frunza, M., Scripariu, L.: Improved RSA encryption algorithm for increased security of wireless networks. In: IEEE International Symposium on Signals, Circuits and Systems, pp. 1\u20134 (2007)","DOI":"10.1109\/ISSCS.2007.4292737"},{"key":"86_CR6","doi-asserted-by":"crossref","unstructured":"Ren, W., Miao, Z.: A hybrid encryption algorithm based on DES and RSA in Bluetooth communication. In: IEEE 2nd International Conference on Modeling, Simulation and Visualization Methods, pp. 221\u2013225 (2010)","DOI":"10.1109\/WMSVM.2010.48"},{"key":"86_CR7","doi-asserted-by":"crossref","unstructured":"Sexsena, S., Kapoor, B.: An efficient parallel algorithm for secured data communication using RSA public key cryptography method. In: IEEE International Conference on Advanced Computing, pp. 850\u2013854 (2014)","DOI":"10.1109\/IAdCC.2014.6779433"},{"key":"86_CR8","doi-asserted-by":"crossref","unstructured":"Prema, G., Natarajan, S.: An enhanced security algorithm for wireless application using RSA and genetic approach. In: IEEE 4th International Conference on Computing, Communication and Networking Technologies, pp. 1\u20135 (2013)","DOI":"10.1109\/ICCCNT.2013.6726679"},{"key":"86_CR9","doi-asserted-by":"crossref","unstructured":"De Costa, C., Moren, R.L., Carpinteiro, O.S., Pimenta, T.C.: A 1024 bit CMOS. In: IEEE 25th International Conference on Microelectronics, pp. 1\u20134 (2013)","DOI":"10.1109\/ICM.2013.6734980"},{"key":"86_CR10","doi-asserted-by":"crossref","unstructured":"Tan, X., Li, Y.: Parallel analysis of an improved RSA algorithm. In: IEEE International Conference on Computer Science and Electronics Engineering, pp. 318\u2013320 (2012)","DOI":"10.1109\/ICCSEE.2012.286"},{"key":"86_CR11","doi-asserted-by":"crossref","unstructured":"Li, Y., Liu, Q., Li, T.: Design and implementation of an improved RSA algorithm. In: IEEE Conference on E-Health Networking, Digital Ecosystems and Technologies, pp. 390\u2013393 (2010)","DOI":"10.1109\/EDT.2010.5496553"},{"issue":"2","key":"86_CR12","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1016\/j.ipl.2014.10.007","volume":"115","author":"Chandrashekhar Meshram","year":"2015","unstructured":"Meshram, C.: An efficient ID based cryptographic encryption based on discrete logarithm problem and integer factorization problem. Elsevier\u2019s Inf. Process. Lett. 115, 351\u2013358 (2015)","journal-title":"Information Processing Letters"},{"issue":"21","key":"86_CR13","doi-asserted-by":"crossref","first-page":"905","DOI":"10.1049\/el:19820617","volume":"18","author":"J.-J. Quisquater","year":"1982","unstructured":"Couvreur, C., Quisquater, J.: Fast decipherment algorithm of RSA public key cryptosystem. Electron. Lett. 18(21), 905\u2013907 (1982)","journal-title":"Electronics Letters"},{"key":"86_CR14","doi-asserted-by":"crossref","unstructured":"Boneh, D., Demillo, R.A., Lipton, R.J.: On the importance of checking cryptographic protocols for fault. EUROCRYPT\u201997, Springer-Verlag, LNCS, vol. 1233, pp. 37\u201351 (1997)","DOI":"10.1007\/3-540-69053-0_4"},{"key":"86_CR15","unstructured":"Bellcore Press Release: New threat model breaks crypto codes, Sept 1996. http:\/\/www.bellcore.com\/press\/ADVSRY96\/facts.html"},{"key":"86_CR16","doi-asserted-by":"crossref","unstructured":"Cao, Y.Y., Fu, C.: An efficient implementation of RSA digital signature algorithm. In: IEEE International Conference on Intelligent Computation Technology and Automation, pp. 100\u2013103 (2008)","DOI":"10.1109\/ICICTA.2008.398"},{"key":"86_CR17","doi-asserted-by":"crossref","unstructured":"Dhakar, R.S., Gupta, A.K., Sharma, P.: Modified RSA encryption algorithm. In: IEEE 2nd International Conference on Advanced Computing and Communication Technologies, pp. 426\u2013429 (2012)","DOI":"10.1109\/ACCT.2012.74"},{"key":"86_CR18","doi-asserted-by":"crossref","unstructured":"Dongjiang, L., Yandan, W., Hong, C.: The research on key generation in RSA public-key cryptosystem. In: IEEE 4th International Conference on Computational and Information Sciences, pp. 578\u2013580 (2012)","DOI":"10.1109\/ICCIS.2012.348"},{"key":"86_CR19","unstructured":"Materials downloaded from www.google.com , www.wikipedia.org , http:\/\/www.wiziq.com\/tutorials\/java-implementation-rsa , www.jatit.org , and www.RSAlaboratories.org ."}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of Fifth International Conference on Soft Computing for Problem Solving"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-0448-3_86","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T21:18:06Z","timestamp":1748812686000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-0448-3_86"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9789811004476","9789811004483"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-0448-3_86","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2016]]}}}