1. Cole, E. (2008). Network security fundamentals. Wiley.
2. Barukab, O. M., Khan, A. I., Sharief Shaik, M., Ramana Murthy, M., & Ali Khan, S. (2012). Secure communication using symmetric and asymmetric cryptographic techniques. Int. J. Inf. Eng. Electron. Bus., 4(2), 36–42.
3. Villanueva, J. (2015). What is a digital signature? http://www.jscape.com/
4. Khatua, S. (s.d.). International Journal of Latest Trends in Computing, l2(2), 2(2).
5. Uchimi, A. (2003). What is PKI. Kyokai Joho Imeji Zasshi/Journal Inst. Image Inf. Telev. Eng., 57(5), 585–588.