Write essay_2
This commit is contained in:
parent
ac07112f04
commit
bba4f61d44
2 changed files with 161 additions and 80 deletions
112
bibliography.bib
112
bibliography.bib
|
|
@ -1,26 +1,94 @@
|
|||
@ARTICLE{shannon,
|
||||
author={Shannon, C.E.},
|
||||
journal={Proceedings of the IEEE},
|
||||
title={Communication In The Presence Of Noise},
|
||||
year={1998},
|
||||
volume={86},
|
||||
@INPROCEEDINGS{hybrid-performance,
|
||||
author={Zhang, Qixin},
|
||||
booktitle={2021 2nd International Conference on Computing and Data Science (CDS)},
|
||||
title={An Overview and Analysis of Hybrid Encryption: The Combination of Symmetric Encryption and Asymmetric Encryption},
|
||||
year={2021},
|
||||
volume={},
|
||||
number={},
|
||||
pages={616-622},
|
||||
keywords={Information security;Information processing;Data science;Elliptic curve cryptography;Encryption;Internet;encryption algorithm;symmetric algorithm;asymmetric algorithm;hybrid encryption},
|
||||
doi={10.1109/CDS52072.2021.00111}}
|
||||
|
||||
@misc{performance-comparison, title={Asymmetric vs symmetric encryption-1: Comparing their performances}, url={https://securemyorg.com/asymmetric-vs-symmetric-encryption-1/}, journal={SecureMyOrg}, author={SecureMyOrg}, year={2024}, month={Dec}}
|
||||
|
||||
@INPROCEEDINGS{aes-performance,
|
||||
author={Bhat, Bawna and Ali, Abdul Wahid and Gupta, Apurva},
|
||||
booktitle={International Conference on Computing, Communication & Automation},
|
||||
title={DES and AES performance evaluation},
|
||||
year={2015},
|
||||
volume={},
|
||||
number={},
|
||||
pages={887-890},
|
||||
keywords={Encryption;Standards;Classification algorithms;Ciphers;Memory management;AES;DES;Cryptography;entropy},
|
||||
doi={10.1109/CCAA.2015.7148500}}
|
||||
|
||||
@article{rsa,
|
||||
title={The RSA algorithm},
|
||||
author={Milanov, Evgeny},
|
||||
journal={RSA laboratories},
|
||||
volume={1},
|
||||
number={11},
|
||||
year={2009}
|
||||
}
|
||||
|
||||
@article{dh-key-exchange,
|
||||
title={Diffie-Hellman Key Exchange},
|
||||
author={Exchange, Diffie-Hellman Key},
|
||||
journal={Diffie\% E2},
|
||||
volume={80},
|
||||
year={1976}
|
||||
}
|
||||
|
||||
|
||||
@article{symmetric-vs-asymmetric,
|
||||
title={Symmetric and asymmetric encryption},
|
||||
author={Simmons, Gustavus J},
|
||||
journal={ACM Computing Surveys (CSUR)},
|
||||
volume={11},
|
||||
number={4},
|
||||
pages={305--330},
|
||||
year={1979},
|
||||
publisher={ACM New York, NY, USA}
|
||||
}
|
||||
|
||||
@article{symmetric-security,
|
||||
title={Symmetric encryption algorithms: Review and evaluation study},
|
||||
author={Alenezi, Mohammed N and Alabdulrazzaq, Haneen and Mohammad, Nada Q},
|
||||
journal={International Journal of Communication Networks and Information Security},
|
||||
volume={12},
|
||||
number={2},
|
||||
pages={447-457},
|
||||
keywords={Acoustic noise;Distortion;Telegraphy;Telephony;Communication systems;Bandwidth;Radio transmitters;Signal processing;Signal mapping;Teleprinting},
|
||||
doi={10.1109/JPROC.1998.659497}}
|
||||
|
||||
@BOOK{huffman,
|
||||
author={Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, and Clifford Stein},
|
||||
title={Introduction to Algorithms},
|
||||
volume={2},
|
||||
year={2001},
|
||||
pages={385-392},
|
||||
isbn={0-262-03293-7}
|
||||
pages={256--272},
|
||||
year={2020},
|
||||
publisher={Kohat University of Science and Technology (KUST)}
|
||||
}
|
||||
|
||||
@article{modulation,
|
||||
title={Principles of digital modulation},
|
||||
author={Fitton, Mike},
|
||||
journal={URL http://www. berk. tc/combas/digital\_mod. pdf},
|
||||
year={2002}
|
||||
@article{des,
|
||||
title={Data encryption standard},
|
||||
author={Standard, Data Encryption and others},
|
||||
journal={Federal Information Processing Standards Publication},
|
||||
volume={112},
|
||||
number={3},
|
||||
year={1999},
|
||||
publisher={De Standaard}
|
||||
}
|
||||
|
||||
@article{tls,
|
||||
title={Transport layer security},
|
||||
author={Turner, Sean},
|
||||
journal={IEEE Internet Computing},
|
||||
volume={18},
|
||||
number={6},
|
||||
pages={60--63},
|
||||
year={2014},
|
||||
publisher={IEEE}
|
||||
}
|
||||
|
||||
@article{pgp,
|
||||
title={„PGP--Pretty Good Privacy},
|
||||
author={Zimmermann, Philip},
|
||||
journal={Public Key Encryption for the Masses, User's Guide},
|
||||
volume={1},
|
||||
year={1997}
|
||||
}
|
||||
|
||||
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue