1. Big Data for Defence and Security report;Couch;Royal United Services Institute (RUSI),2013
2. Quantum-Secure Authentication Of A Physical Unclonable Key;Goorden;Optica,2014
3. Thayananthan V, Alzahrani A and Qureshi M S. Efficient techniques of key management and quantum cryptography in RFID networks”, SECURITY AND COMMUNICATION NETWORKS, USA, 2014 (Published online in Wiley Online Library (wileyonlinelibrary.com). DOI: 10.1002/sec.1005).
4. Analysis of Key Management and Quantum Cryptography in Wireless Sensors Networks;Thayananthan;IJCA Special Issue on “Network Security and Cryptograph. (NSC 2011), International Journal of Computer Applications (IJCA), USA,2011
5. Lin, S.-H., Chiu, J.-H. and Lee, G.-R. A Fast Iterative Localized Re-authentication Protocol for Heterogeneous Mobile Networks. IEEE Transaction on Consumer Electronic, 56, 2010; 2267-2276. http://dx.doi.org/10.1109/TCE.2010.5681099.