1. The National Institute of Standards and Technology (2010), Guide for Cybersecurity Event Recovery, available at: https://nvlpubs.nist.gov/nistpubs/.../NIST.SP.800-184.pdf (Accessed Februray 1, 2020).
2. The National Institute of Standards and Technology (2001), Security requirements for cryptographic modules, available at: https://csrc.nist.gov/publications/fips/fips140-2/fips1402.pdf (Accessed Februray 1, 2020).
3. Cichonski, J., Franklin, J.M. and Bartock, M. (2017), Guide to LTE Security, available at: https://csrc.nist.gov/publications/drafts/800-187/sp800_187_draft.pdf (Accessed Februray 1, 2020).
4. Hryshchuk, R., Yevseiev, S. and Shmatko, A. (2018), Construction methodology of information security system of banking information in automated banking systems: monograph, Premier Publishing s. r. o., Vienna, 284 p.
5. Ankur Lohachab Anu Lohachab Ajay Jangra (2020), A Comprehensive Survey of Prominent Cryptographic Aspects for Securing Communication in Post-Quantum IoT Networks, Internet of Things, available at: https://www.sciencedirect.com/science/article/pii/S2542660520300159 (Accessed Februray 1, 2020). https://doi.org/10.1016/ j.iot.2020.100174.