1. M. Nagendra & M. C. Sekhar, (2014)."Performance Improvement of Advanced Encryption Algorithm using Parallel Computation", International Journal of Software Engineering and Its Applications Vol.8, No.2, pp. 287-296.
2. Hardjono T. and Dondeti L. (2005). Security in Wireless LANS and MANS (Artech House Computer Security). Artech House, Inc., Norwood, MA, USA.
3. A.Jagadeesan and Dr. K.Duraiswamy, (2010). "Secured Cryptographic Key Generation from Multimodal Biometrics: Feature Level Fusion of Fingerprint and Iris, (IJCSIS) International Journal of Computer Science and Information Security, Vol. 7, No. 2, February 2010.
4. Sunil V. K. Gaddam and Manohar Lal, (2010). "Efficient Cancellable Biometric Key Generation Scheme for Cryptography", International Journal of Network Security, Vol.11, No.2, PP.61-69.
5. Zdenek (Sid) Paral, and Srinivas Devadas, "Reliable and Efficient PUF-Based Key Generation Using Pattern Matching", 978-1-4577-1058-2/11/$26.00c 2011 IEEE.