Journal of Engineering and Applied Sciences
Year:
2018
Volume:
13
Issue:
5 SI
Page No.
4774 - 4777
References
Al-Maamori, F. and T. Hilberdink, 2015. An example in Beurling's theory of generalised primes. Acta Arithmetica, 168: 383-395.
CrossRef | Direct Link | Al-Maamori, F., A. Hadi and A. Al-Salih, 2016. Building the primes P and Q (of the public key algorithm) by using function of reals. Res. J. Appl. Sci., 11: 1050-1053.
CrossRef | Al-Maamori, F.A., 2017. Examples of beurling prime systems. Math. Slovaca, 67: 321-344.
Direct Link | Apostol, T.M., 1974. Mathematical Analysis. 2nd Edn., Addison-Wesley, Boston, Massachusetts, ISBN:9780201002881, Pages: 492.
Apostol, T.M., 1976. Introduction to Analytic Number Theory. 1st Edn., Springer, New York, ISBN: 9781475755794, Pages: 340.
Kent, S. and R. Atkinson, 1998. IP Encapsulating Security Payload (ESP). Internet RFC., 1: 1-22.
Direct Link | McCubbin, C.B., A.A. Selcuk and D. Sidhu, 2000. Initialization vector attacks on the IPsec protocol suite. Proeedings of the IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE’2000), June 14-16, 2000, IEEE, Gaithersburg, Maryland, USA., pp: 171-175.