1 V. Miller, "Use of elliptic curves in cryptography" 85 : 417-426, 1985
2 NCCIC, "Understanding Denial-of-Service Attacks"
3 Z. Ramzan, "Springer Handbook of Information and Communication Security" 433-448, 2010
4 W. Diffie, "New Directions in Cryptography" IT-22 : 644-654, 1976
5 F. Callegati, "Man-in-the-Middle Attack to the HTTPS Protocol" 7 (7): 78-81, 2009
6 M. Bellare, "Introduction to Modern Cryptography"
7 "ISO/IEC 18033-3: Information technology – Security techniques – Encryption algorithms –Part 3: Block ciphers"
8 G. R. Patel, "Hybrid Encryption Algorithm" 2 (2): 2014
9 P. Gralla, "How the Internet Works" Que Pub. 201-248, 2007
10 "Federal Information Processing Standards Publication 197, Announcing the ADVANCED ENCRYPTION STANDARD (AES)"
1 V. Miller, "Use of elliptic curves in cryptography" 85 : 417-426, 1985
2 NCCIC, "Understanding Denial-of-Service Attacks"
3 Z. Ramzan, "Springer Handbook of Information and Communication Security" 433-448, 2010
4 W. Diffie, "New Directions in Cryptography" IT-22 : 644-654, 1976
5 F. Callegati, "Man-in-the-Middle Attack to the HTTPS Protocol" 7 (7): 78-81, 2009
6 M. Bellare, "Introduction to Modern Cryptography"
7 "ISO/IEC 18033-3: Information technology – Security techniques – Encryption algorithms –Part 3: Block ciphers"
8 G. R. Patel, "Hybrid Encryption Algorithm" 2 (2): 2014
9 P. Gralla, "How the Internet Works" Que Pub. 201-248, 2007
10 "Federal Information Processing Standards Publication 197, Announcing the ADVANCED ENCRYPTION STANDARD (AES)"
11 N. Koblitz, "Elliptic curve cryptosystems" 48 (48): 203-209, 1987
12 D. R. Stinson, "Discrete Mathematics and Its Applications" Chapman and Hall/CRC 2005
13 A. Agrawal, "Design of Hybrid Cryptography Algorithm for Secure Communication" 03 (03): 2016
14 D. Bhole, "A New Security Protocol Using Hybrid Cryptography Algorithms" 4 (4): 2016