1. R. Mukesh and V. J. Subashini, in IEEE Int. Conf. on Advances in Engineering, Science and Management (IEEE, 2012), pp. 16–19.
2. P. S. Revenkar and A. Anjum, J. of Computer Science and Information Security 3, 217 (2014).
3. M. D. Dhameliye and J. P. Chaudhari, Int. J. of Engineering Trends and Technology 4, 1908 (2013).
4. K. Nimmy and M. Sethumadhavan, J. of Information Security Research 5, 39 (2014).
5. M. Naor and A. Shamir, in EUROCRYPT, edited by A. D. Santis (LNCS, Springer, Berlin, Heidelberg, 1994), vol. 950, pp. 1–12.