|
[1] Y.L. Huang and F.Y. Leu, ―Constructing a Secure Point-to-Point Wireless Environment by Integrating Diffie-Hellman PKDS RSA and Stream Ciphering for Users Known to Each Other,‖ Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, vol. 2, no. 3, September 2011, pp. 96-107. [2] S.M. Lee, D.S. Kim and J.S. Park, ―A Survey and Taxonomy of Lightweight Intrusion Detection Systems,‖ Journal of Internet Services and Information Security, vol. 2, issue 1/2, February 2012, pp. 119-131. [3] S.K. Pandey and R. Barua, ―Efficient Construction of Identity Based Signcryption Schemes from Identity Based Encryption and Signature Schemes,‖ Journal of Internet Services and Information Security, Vol. 1, No.2/3, August 2011, pp. 161-180. [4] J. Katz and Y. Lindell, Introduction to Modern Cryptography, Chapman & Hall/CRC Press, 2008. [5] C.H. Yang, Network Security: Theory and Practice, Xbook Marketing Co. Ltd., September, 2008. [6] M. Bellare and P. Rogaway, Introduction to Modern Cryptography, chapter 3, May 11, 2005. http://digidownload.libero.it/persiahp/crittografia/2005_Introduction_to_Modern_Cryptography.pdf [7] J. Hunker and C.W. Probst, ―Insiders and Insider Threats—an Overview of Definitions and Mitigation Techniques,‖ Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, Vol. 2, No. 1, March 2011, pp. 4–27. [8] M. Dworkin, ―Recommendation for Block Cipher Modes of Operation Methods and Techniques,‖ National Institute of Standards and Technology Special Publcation. 800-38A 2001 Edition, December 2001. [9] Types of Cryptographic Attacks. In Domain 5: Cryptography. Retrieved February 27, 2011, fromhttp://www.giac.org/resources/whitepaper/cryptography/57.php [10] S. Klaus, Cryptography and Public Key Infrastructure on the Internet, John Wiley and Sons, 1st edition, June 2, 2003. [11] A.J. Menezes, P.C. van Oorschot and S.A. Vanstone, "Chapter 7: Block Ciphers". Handbook of Applied Cryptography. CRC Press. ISBN 0-8493-8523-7. October 1997. [12] Y.F. Huang, F.Y. Leu, C.H. Chiu and I.L. Lin, "Improving Security Levels of IEEE802.16e Authentication by Invoking Diffie-Hellman PKDS," Journal of Universal Computer Science, Vol. 17, No.6, March 2011, pp. 891-911. [13] A.P. Moore, D.M. Cappelli, T.C. Carony, E. Shaw, D. Spooner and R.F. Trzeciak, ―A Preliminary Model of Insider Theft of Intellectual Property,‖ Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, Vol. 2, No. 1, March 2011, pp. 28–49. [14] E. Barkan and E. Biham, "In How Many Ways Can You Write Rijndael?" in Proceedings of ASIACRYPT 2002, (Lecture Notes in Computer Science), edited by Y. Zheng, vol. 2501. Berlin, Germany: Springer-Verlag, Dec. 2002, pp. 160-175. [15] J. Daemen and V. Rijmen, ―AES Proposal: Rijndael,‖ The First Advanced Encryption Standard Candidate Conference, NIST, September 1999. [16] Federal Information Processing Standards Publication 197, ―Announcing the Advanced Encryption Standard (AES)‖ November 26, 2001. [17] Y.L. Huang, F.Y. Leu, J.C. Liu, J.H. Yang, C.W. Yu, C.C. Chu, C.T. Yang, ―Building a block cipher mode of operation with feedback keys,‖ Industrial Electronics (ISIE), 2013 IEEE International Symposium on, May 2013, pp. 1-4. [18] Y.L. Huang, F.Y. Leu, J.H. Yang, ―Building a block cipher mode of operation with two keys,‖ The Asian Conference on Availability, Reliability and Security (AsiaARES 2013), Mar. 2013, pp. 392-398. [19]T. Eisenbarth, S. Kumar, L. Uhsadel, C. Paar and A. Poschmann, ―A Survey of Lightweight-Cryptography Implementations,‖ IEEE Design & Test of Computers, Dec. 2007, pp. 522-533. [20] H.M. Heys, ―A tutorial on linear and differential cryptanalysis,‖ Technical Report CORR 2001-17, Centre for Applied Cryptographic Research, Department of Combinatorics and Optimization, University of Waterloo, March 2001. [21] Y.S. Yeh, C.Y. Lee, T.Y. Huang and C.H. Lin ―A Transpositional Advanced Encryption Standard (AES) Resists 3-Round Square Attack,‖ International Journal of Innovative Computing, Information and Control, vol. 5, no. 5, May 2009, pp. 1253-1264. [22] L. Cui and Y. Cao "A New S-Box Structure Named Affine-Power-Affine,‖ International Journal of Innovative Computing, Information and Control, Vol. 3, No. 3, June 2007, pp. 751-759. [23] H.Z. Yao, ―The Comparison of Efficiency and Security between AES and DES,‖ Journal of Zhongkai University of Agriculture and Technology, February 2006, pp. 44–48.
|