Y. L. Huang and F. Y. Leu, Constructing a Secure Point-to-Point Wireless Environment by Integrating Diffie-Hellman PKDS RSA and Stream Ciphering for Users Known to Each Other, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, pp.96-107, 2011.

S. M. Lee, D. S. Kim, and J. S. Park, A Survey and Taxonomy of Lightweight Intrusion Detection Systems, Journal of Internet Services and Information Security, vol.2, issue.12, pp.119-131, 2012.

S. K. Pandey and R. Barua, Efficient Construction of Identity Based Signcryption Schemes from Identity Based Encryption and Signature Schemes, Journal of Internet Services and Information Security, vol.13, issue.2, pp.161-180, 2011.

C. H. Yang, Network Security: Theory and Practice, 2008.

J. Hunker and C. W. Probst, Insiders and insider threats?an overview of definitions and mitigation techniques, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, pp.4-27, 2011.

Y. F. Huang, F. Y. Leu, C. H. Chiu, and I. L. Lin, Improving Security Levels of IEEE802.16e Authentication by Involving Diffie-Hellman PKDS, Journal of Universal Computer Science, vol.17, issue.6, pp.891-911, 2011.

A. P. Moore, D. M. Cappelli, T. C. Carony, E. Shaw, D. Spooner et al., A preliminary model of insider theft of intellectual property, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, pp.28-49, 2011.

E. Barkan and E. Biham, In How Many Ways Can You Write Rijndael?, Proc. ASIACRYPT 2002, ser. Lecture Notes in Computer Science, Y. Zheng, pp.160-175, 2002.
DOI : 10.1007/3-540-36178-2_10

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.20.2563

J. Daemen and V. Rijmen, AES Proposal : Rijndael The First Advanced Encryption Standard Candidate Conference A Survey of Lightweight-Cryptography Implementations, IEEE Design & Test of Computers, vol.13, pp.522-533, 1999.

M. Dworkin, Recommendation for BlockCipher Modes of OperationMethods and Techniques, Natl. Inst. Stand. Technol. Spec. Publ, vol.800, 2001.

M. Electronic, One Time Key Encryption

F. Y. Yang, Z. W. Liu, and S. H. Chiu, Mobile Banking Payment System, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, pp.85-95, 2011.

S. H. El-ramly, T. El-garf, and A. H. Soliman, Dynamic Generation of S-boxes in Block Cipher Systems " Radio Science Conference, pp.389-397, 2002.