共 17 条
[1]
Alam M.I., Khan M.R., Performance and efficiency analysis of different block cipher algorithms of symmetric key cryptography, International Journal of Advanced Research in Computer Science and Software Engineering, 3, 10, pp. 713-720, (2013)
[2]
Apoorva Y.K., Comparative study of different symmetric key cryptography algorithms, International Journal of Application or Innovation in Engineering and Management, 2, 7, pp. 204-206, (2013)
[3]
Charbathia S., Sharma S., A comparative study of Rivest cipher algorithms, International Journal of Information & Computation Technology, 4, 171, pp. 1831-1838, (2014)
[4]
Chugh S., Kamal, Securing data transmission over wireless LAN (802.11) by redesigning RC4 algorithm, 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), pp. 1436-1441, (2015)
[5]
Elminaam D.S.A., Kader H.M.A., Hadhoud M.M., Performance evaluation of symmetric encryption algorithms, International Journal of Computer Science and Network Security, 8, 12, pp. 280-286, (2008)
[6]
Giradkar S.S., Bhattacharya A., Securing compressed video streams using RC4 encryption scheme, 2015 Global Conference on Communication Technologies (GCCT), pp. 640-644, (2015)
[7]
Kandar S., Maiti A., Variable length key based visual cryptography scheme for color image using random number, International Journal of Computer Applications, 19, 4, pp. 35-40, (2011)
[8]
Koko S.O.A.F.M., Babiker A., Comparison of various encryption algorithms and techniques for improving secured data communication, IOSR Journal of Computer Engineering (IOSR-JCE), 17, 1, pp. 62-69, (2015)
[9]
Kumar A., Jakhar D.S., Makkar M.S., Comparative analysis between DES and RSA algorithm's, International Journal of Advanced Research in Computer Science and Software Engineering, 2, 7, pp. 386-391, (2012)
[10]
Lian S.G., Liu Z.X., Ren Z., Wang H.L., Secure advanced video coding based on selective encryption algorithms, IEEE Trans. Consumer Electron, 52, 2, pp. 621-629, (2006)