1. Adams, C., Lloyd, S.: Understanding PKI: Concepts, Standards, and Deployment Considerations. Addison-Wesley Professional, Boston (2003)
2. Kumar, Y., Munjal, R., Sharma, H.: Comparison of symmetric and asymmetric cryptography with existing vulnerabilities and countermeasures. Int. J. Comput. Sci. Manag. Stud. 11(03), 60–63 (2011)
3. Zhang, X., et al.: Malicious packet dropping: how it might impact the TCP performance and how we can detect it. In: Proceedings 2000 International Conference on Network Protocols. IEEE (2000)
4. Padmanabhan, V.N., Simon, D.R.: Secure traceroute to detect faulty or malicious routing. ACM SIGCOMM Comput. Commun. Rev. 33(1), 77–82 (2003)
5. Yeung, K.H., Leung, T.C.: Building secure network infrastructure for LANs. IPSI Trans. Adv. Res. 2(2), 32–37 (2006)