1. Meyer, C.H.: Cryptography-a state of the art review. In: CompEuro’89., VLSI and Computer Peripherals. VLSI and Microelectronic Applications in Intelligent Peripherals and their Interconnection Networks’, Proceedings. IEEE (1989)
2. Krutz, R.L., Dean Vines, R.: Cloud Security: A Comprehensive Guide to Secure Cloud Computing. Wiley Publishing (2010)
3. Ruangchaijatupon, N., Krishnamurthy, P.: Encryption and Power Consumption in Wireless LANs-N. In: The Third IEEE Workshop on Wireless LANS (2001)
4. Hirani, S.: Energy Consumption of Encryption Schemes in Wireless Devices Thesis, University of Pittsburgh, April 9, 2003. Accessed 1 Oct 2008
5. Thakur, J., Kumar, N.: DES, AES and blowfish: symmetric key cryptography algorithms simulation based performance analysis. Int. J. Emerg. Technol. Adv. Eng. 1(2), 6–12 (2011)