1. A survey of wireless network security;Gopalakrishnan;Int. J. Comput. Sci. Mob. Comput.,2014
2. A Survey Paper on Efficient Privacy Preserving and Secure Data Integrity Protection in Regenerating Coding Based Public Cloud Storage;Thakare,2016
3. Comprehensive study of symmetric key and asymmetric key encryption algorithms;Yassein,2017
4. Understanding Cryptography;Paar,2010
5. “A High Performance FPGA Implementation of DES,” 2000 IEEE Work. SiGNAL Process. Syst. SiPS 2000;McLoone,2000