1. A survey on wireless multimedia sensor networks
2. Idrizi, F., Dalipi, F., & Rustemi, E. (2013). Analyzing the speed of combined cryptographic algorithms with secret and public key.International Journal of Engineering Research and Development, 8(2), 4.
3. A Comparative Study of Some Symmetric and Asymmetric Key Cryptography Algorithm. International Journal of Innovative Research in Science;N.Bisht;Engineering and Technology,2015
4. A Comparative Study of Some Symmetric and Asymmetric Key Cryptography Algorithms.;N.Bisht;International Journal of Innovative Research in Science,2015
5. Brumley, B.B., & Hakala, R.M. (2009). Cache-timing template attacks. In ASIACRYPT (Vol. 5912, pp. 667-684).