1. Babu R, Abraham G, Borasia K (2012) A review on securing distributed systems using symmetric key cryptography. Int J Adv Sci Technol 4(4)
2. Singh A, Nandal A, Malik S (2012) Implementation of caesar cipher with rail fence for enhancing data security. Int J Adv Res Comput Sci Softw Eng, pp 78–82
3. Kahate A (2013) Cryptography and network Security. McGraw Hill Education (India) Private Limited
4. Kester QA (2013) A hybrid cryptosystem based on Vigenere cipher and columnar transposition cipher. Int J Adv Technol Eng Res, pp 141–147
5. Stallings W (2004) Network security essentials (applications and standards). Pearson Education