References
[1]. Abdullah, A. M. (2017). Advanced encryption
standard (AES) algorithm to encrypt and decrypt data.
Cryptography and Network Security, 16, 1-11.
[5]. Goyal, P., Batra, S., & Singh, A. (2010). A literature review of security attack in mobile ad-hoc networks.
International Journal of Computer Applications, 9(12),
11-15.
[8].
Keuninckx, L., Soriano, M. C., Fischer, I., Mirasso, C. R.,
Nguimdo, R. M., & Van der Sande, G. (2017). Encryption
key distribution via chaos synchronization. Scientific
Reports, 7(1), 1-14.
[10]. Maqsood, F., Ahmed, M., Ali, M. M., & Shah, M. A.
(2017). Cryptography: a comparative analysis for
modern techniques. International Journal of Advanced
Computer Science and Applications, 8(6), 442-448.
[11]. Melnikov, D., & Jones, A. (2004, June).
Masquerade'attacks and a process for their detection. In
Proceedings of the 3rd European Conference on
Information Warfare and Security. Royal Holloway
University of London, UK (pp. 269).
[12]. Mushtaq, M. F., Jamel, S., Disina, A. H., Pindar, Z. A.,
Shakir, N. S. A., & Deris, M. M. (2017). A survey on the
cryptographic encryption algorithms. International
Journal of Advanced Computer Science and
Applications, 8(11), 333-344.
[13].
Ning, J., Xu, J., Liang, K., Zhang, F., & Chang, E. C.
(2018). Passive attacks against searchable encryption.
IEEE Transactions on Information Forensics and Security,
14(3), 789-802.
[14]. Patil, S., & Bhusari, V. (2014). An enhancement in
international data encryption algorithm for increasing
security. International Journal of Application or Innovation
in Engineering & Management, 3(8), 64-70.
[15]. Samant, P. K., Viswakarma, S. K., & Yadav, P. (2015).
Security loopholes and passive attacks for m-commerce
in pki-based infrastructure. International Journal of
Advanced Technology in Engineering and Science, 3(1),
54-62.
[17]. Steiner, M., Tsudik, G., & Waidner, M. (1996,
January). Diffie-Hellman key distribution extended to
group communication. In Proceedings of the 3rd ACM
Conference on Computer and Communications
Security (pp. 31-37).
[18]. Thakur, J., & Kumar, N. (2011). DES, AES and Blowfish:
Symmetric key cryptography algorithms simulation based
performance analysis. International Journal of Emerging
Technology and Advanced Engineering, 1(2), 6-12.
[19]. Verma, H. K., & Singh, R. K. (2012). Performance
analysis of RC6, Twofish and Rijndael block cipher
algorithms. International Journal of Computer Applications,
42(16), 1-7.