Clean bibliography
This commit is contained in:
parent
bba4f61d44
commit
cc9a28c658
1 changed files with 0 additions and 93 deletions
|
|
@ -1,94 +1 @@
|
|||
@INPROCEEDINGS{hybrid-performance,
|
||||
author={Zhang, Qixin},
|
||||
booktitle={2021 2nd International Conference on Computing and Data Science (CDS)},
|
||||
title={An Overview and Analysis of Hybrid Encryption: The Combination of Symmetric Encryption and Asymmetric Encryption},
|
||||
year={2021},
|
||||
volume={},
|
||||
number={},
|
||||
pages={616-622},
|
||||
keywords={Information security;Information processing;Data science;Elliptic curve cryptography;Encryption;Internet;encryption algorithm;symmetric algorithm;asymmetric algorithm;hybrid encryption},
|
||||
doi={10.1109/CDS52072.2021.00111}}
|
||||
|
||||
@misc{performance-comparison, title={Asymmetric vs symmetric encryption-1: Comparing their performances}, url={https://securemyorg.com/asymmetric-vs-symmetric-encryption-1/}, journal={SecureMyOrg}, author={SecureMyOrg}, year={2024}, month={Dec}}
|
||||
|
||||
@INPROCEEDINGS{aes-performance,
|
||||
author={Bhat, Bawna and Ali, Abdul Wahid and Gupta, Apurva},
|
||||
booktitle={International Conference on Computing, Communication & Automation},
|
||||
title={DES and AES performance evaluation},
|
||||
year={2015},
|
||||
volume={},
|
||||
number={},
|
||||
pages={887-890},
|
||||
keywords={Encryption;Standards;Classification algorithms;Ciphers;Memory management;AES;DES;Cryptography;entropy},
|
||||
doi={10.1109/CCAA.2015.7148500}}
|
||||
|
||||
@article{rsa,
|
||||
title={The RSA algorithm},
|
||||
author={Milanov, Evgeny},
|
||||
journal={RSA laboratories},
|
||||
volume={1},
|
||||
number={11},
|
||||
year={2009}
|
||||
}
|
||||
|
||||
@article{dh-key-exchange,
|
||||
title={Diffie-Hellman Key Exchange},
|
||||
author={Exchange, Diffie-Hellman Key},
|
||||
journal={Diffie\% E2},
|
||||
volume={80},
|
||||
year={1976}
|
||||
}
|
||||
|
||||
|
||||
@article{symmetric-vs-asymmetric,
|
||||
title={Symmetric and asymmetric encryption},
|
||||
author={Simmons, Gustavus J},
|
||||
journal={ACM Computing Surveys (CSUR)},
|
||||
volume={11},
|
||||
number={4},
|
||||
pages={305--330},
|
||||
year={1979},
|
||||
publisher={ACM New York, NY, USA}
|
||||
}
|
||||
|
||||
@article{symmetric-security,
|
||||
title={Symmetric encryption algorithms: Review and evaluation study},
|
||||
author={Alenezi, Mohammed N and Alabdulrazzaq, Haneen and Mohammad, Nada Q},
|
||||
journal={International Journal of Communication Networks and Information Security},
|
||||
volume={12},
|
||||
number={2},
|
||||
pages={256--272},
|
||||
year={2020},
|
||||
publisher={Kohat University of Science and Technology (KUST)}
|
||||
}
|
||||
|
||||
@article{des,
|
||||
title={Data encryption standard},
|
||||
author={Standard, Data Encryption and others},
|
||||
journal={Federal Information Processing Standards Publication},
|
||||
volume={112},
|
||||
number={3},
|
||||
year={1999},
|
||||
publisher={De Standaard}
|
||||
}
|
||||
|
||||
@article{tls,
|
||||
title={Transport layer security},
|
||||
author={Turner, Sean},
|
||||
journal={IEEE Internet Computing},
|
||||
volume={18},
|
||||
number={6},
|
||||
pages={60--63},
|
||||
year={2014},
|
||||
publisher={IEEE}
|
||||
}
|
||||
|
||||
@article{pgp,
|
||||
title={„PGP--Pretty Good Privacy},
|
||||
author={Zimmermann, Philip},
|
||||
journal={Public Key Encryption for the Masses, User's Guide},
|
||||
volume={1},
|
||||
year={1997}
|
||||
}
|
||||
|
||||
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue