Constructing a Secure Point-to-Point Wireless Environment by Integrating Diffie-Hellman PKDS RSA and Stream Ciphering for Users Known to Each Other, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, pp.96-107, 2011. ,
A Survey and Taxonomy of Lightweight Intrusion Detection Systems, Journal of Internet Services and Information Security, vol.2, issue.12, pp.119-131, 2012. ,
Efficient Construction of Identity Based Signcryption Schemes from Identity Based Encryption and Signature Schemes, Journal of Internet Services and Information Security, vol.13, issue.2, pp.161-180, 2011. ,
Network Security: Theory and Practice, 2008. ,
Insiders and insider threats?an overview of definitions and mitigation techniques, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, pp.4-27, 2011. ,
Improving Security Levels of IEEE802.16e Authentication by Involving Diffie-Hellman PKDS, Journal of Universal Computer Science, vol.17, issue.6, pp.891-911, 2011. ,
A preliminary model of insider theft of intellectual property, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, pp.28-49, 2011. ,
In How Many Ways Can You Write Rijndael?, Proc. ASIACRYPT 2002, ser. Lecture Notes in Computer Science, Y. Zheng, pp.160-175, 2002. ,
DOI : 10.1007/3-540-36178-2_10
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.20.2563
AES Proposal : Rijndael The First Advanced Encryption Standard Candidate Conference A Survey of Lightweight-Cryptography Implementations, IEEE Design & Test of Computers, vol.13, pp.522-533, 1999. ,
Recommendation for BlockCipher Modes of OperationMethods and Techniques, Natl. Inst. Stand. Technol. Spec. Publ, vol.800, 2001. ,
One Time Key Encryption ,
Mobile Banking Payment System, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, pp.85-95, 2011. ,
Dynamic Generation of S-boxes in Block Cipher Systems " Radio Science Conference, pp.389-397, 2002. ,