Author:
Jawad Nibras Hadi,Katran Lamyaa Fahem,Abdulkareem Bushra Jabbar,Albermany Salah A.,Malai Abdulrazaq Agaal
Reference27 articles.
1. M. V. Pawar and J. Anuradha, “Network security and types of attacks in network,” Procedia Comput. Sci., vol. 48, pp. 503–506, 2015.
2. X. Lin, R. Lu, C. Zhang, H. Zhu, P.-H. Ho, and X. Shen, “Security in vehicular ad hoc networks,” IEEE Commun. Mag., vol. 46, no. 4, pp. 88–95, 2008.
3. Q. Jing, A. V Vasilakos, J. Wan, J. Lu, and D. Qiu, “Security of the Internet of Things: perspectives and challenges,” Wirel. Networks, vol. 20, no. 8, pp. 2481–2501, 2014.
4. P. Kitsos, M. D. Galanis, and O. Koufopavlou, “High-speed hardware implementations of the KASUMI block cipher,” in 2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No. 04CH37512), 2004, vol. 2, pp. II–549.
5. G. Golovko, A. Matiashenko, and N. Solopihin, “DATA ENCRYPTION USING XOR CIPHER,” Системи управління, навігації та зв’язку. Збірник наукових праць, vol. 1, no. 63, pp. 81–83, 2021.