Journal of Engineering and Applied Sciences
Year:
2018
Volume:
13
Issue:
5 SI
Page No.
4654 - 4662
References
Albermany, S.A. and G.A. Safda, 2014. Keyless security in wireless networks. Wirel. Pers. Commun., 79: 1713-1731.
CrossRef | Direct Link | Blake, I., G. Seroussi and N. Smart, 1999. Elliptic Curves Cryptography. Cambridge University Press, New York.
Boyd, C. and A. Mathuria, 2013. Protocols for Authentication and Key Establishment. Springer, Berlin, Germany, ISBN:978-3-642-07716-6, Pages: 321.
Cohen, H., G. Frey, R. Avanzi, C. Doche, T. Lange, K. Nguyen and F. Vercauteren, 2005. Handbook of Elliptic and Hyperelliptic Curve Cryptography. Taylor and Francis Group, London, ISBN-13: 9781420034981, Pages: 848.
Kou, W., 2012. Networking Security and Standards. Vol. 394, Springer, Berlin, Germany, ISBN:978-1-4613-7820-4, Pages: 203.
Menezes, A.J., C.V.O. Pual and A.V. Scott, 1996. Handbook and Applied Cryptography. CRC Press, Boca Raton, Florida, USA., ISBN:13-978-0-84-938523-0, Pages: 755.
Stallings, W., 2011. Cryptography and Network Security: Principles and Practice. 5th Edn., Prentice Hall, USA., ISBN: 9780136097044, Pages: 719.
Stinson, D.R., 2005. Cryptography: Theory and Practice. 3rd Edn., CRC Press, Boca Raton, Florida, USA., ISBN:978-1-58488-508-5, Pages: 583.
Udin, M.N., S.A. Halim, M.I. Jayes and H. Kamarulhaili, 2012. Application of message embedding technique in el-gamal elliptic curve cryptosystem. Proceedings of the International Conference on Statistics in Science, Business and Engineering (ICSSBE), September 10-12, 2012, IEEE, Langkawi, Malaysia, ISBN:978-1-4673-1581-4, pp: 1-6.