FOYDALANILGAN ADABIYOTLAR
T. Alpcan, T. Basar: Network Security - A Decision and Game-Theoretic Approach
Blake, G. Seroussi, N. Smart: Elliptic Curves in Cryptography
R. Churchhouse: Codes and Ciphers
Csiszar, J. Koerner: Information Theory: Coding Theorems for Discrete Memoryless Systems
E. Desurvire: Classical and Quantum Information Theory
O. Goldreich: Foundations of Cryptography, Volumes I and II
S. W. Golomb, G. Gong: Signal Design for Good Correlation For Wireless Communication, Cryptography, and Radar
M. Hendry: Multi-application Smart Cards Technology and Applications
R. Lidl, H. Niederreiter: Finite Fields (2nd Edition)
S. Loepp, W. Wootters: Protecting Information: From Classical Error Correction to Quantum Cryptography
J. H. Loxton: Number Theory and Cryptography
M. A. Nielsen, I. L. Chuang: Quantum Computation and Quantum Information
M. Obaidat, N. Boudriga: Security of e-Systems and Computer Networks
J. Talbot, D. Welsh: Complexity and Cryptography: An Introduction
J. C. A. Van Der Lubbe: Basic Methods of Cryptography
T. D. B. Weerasinghe, “Analysis of a Modified RC4 Algorithm,” International Journal of Computer Applications, vol. 51, no. 22, 2012
L. Stošić dan M. Bogdanović, “RC4 Stream Cipher and Possible Attacks on WEP,” International Advanced ComputerScience and Applications, . 110-114, 2012.
FOYDALANILGAN SAYTLAR
https://android.com
https://Gidhub.com
https://encryption.com
https://network.com
https://symantec-enterprise-blogs.security.com/
https//hi-tech.lib.com
https://kbp.wikipedia.org/wiki/security
https://.java.com/ru/
https//w3school.com
https//crypto.com
https//.studfayl.net
https//neonkaraoke.ru
https//codenet.ru
https://cubedmobile.com/blog/threats/cyber-attack-detection-tools-how-to-detect-a-cyber-attack-on-your-smartphone/
Do'stlaringiz bilan baham: |