Axborot xavfsizligi” kafedrasi «Simmetrik kalitli kriptoalgoritmlarning xavfsizliklari tahlili» mavzusida individual loyihasi 2


Download 140.35 Kb.
bet10/10
Sana21.06.2023
Hajmi140.35 Kb.
#1638230
1   2   3   4   5   6   7   8   9   10
Bog'liq
kursh ishi 2

FOYDALANILGAN ADABIYOTLAR
T. Alpcan, T. Basar: Network Security - A Decision and Game-Theoretic Approach
Blake, G. Seroussi, N. Smart: Elliptic Curves in Cryptography
R. Churchhouse: Codes and Ciphers
Csiszar, J. Koerner: Information Theory: Coding Theorems for Discrete Memoryless Systems
E. Desurvire: Classical and Quantum Information Theory
O. Goldreich: Foundations of Cryptography, Volumes I and II
S. W. Golomb, G. Gong: Signal Design for Good Correlation For Wireless Communication, Cryptography, and Radar
M. Hendry: Multi-application Smart Cards Technology and Applications
R. Lidl, H. Niederreiter: Finite Fields (2nd Edition)
S. Loepp, W. Wootters: Protecting Information: From Classical Error Correction to Quantum Cryptography
J. H. Loxton: Number Theory and Cryptography
M. A. Nielsen, I. L. Chuang: Quantum Computation and Quantum Information
M. Obaidat, N. Boudriga: Security of e-Systems and Computer Networks
J. Talbot, D. Welsh: Complexity and Cryptography: An Introduction
J. C. A. Van Der Lubbe: Basic Methods of Cryptography
T. D. B. Weerasinghe, “Analysis of a Modified RC4 Algorithm,” International Journal of Computer Applications, vol. 51, no. 22, 2012
L. Stošić dan M. Bogdanović, “RC4 Stream Cipher and Possible Attacks on WEP,” International Advanced ComputerScience and Applications, . 110-114, 2012.

FOYDALANILGAN SAYTLAR

  • https://cryptography.com

  • https://android.com

  • https://Gidhub.com

  • https://encryption.com

  • https://network.com

  • https://symantec-enterprise-blogs.security.com/

  • https//hi-tech.lib.com

  • https://kbp.wikipedia.org/wiki/security

  • https://.java.com/ru/

  • https//w3school.com

  • https//crypto.com

  • https//.studfayl.net

  • https//neonkaraoke.ru

  • https//codenet.ru

  • https://cubedmobile.com/blog/threats/cyber-attack-detection-tools-how-to-detect-a-cyber-attack-on-your-smartphone/




Download 140.35 Kb.

Do'stlaringiz bilan baham:
1   2   3   4   5   6   7   8   9   10




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling