1.
K. Gaj and P. Chodowiec, “FPGA and ASIC Implementations ofAES,†Cryptographic Engineering, pp. 235-294, Springer, 2009.
2.
A. Shamir, How to Share a Secret, Communications of the ACM, 22(11): 612-613, November 1979.
3.
L. Lamport, Password Authentication with Insecure Communication,Communications of the ACM, 24(11): 770-772, November 1981.
4.
A. J. Menezes, P. C. van Oorschotand S. A. Vanstone, Handbook of Applied Cryptography, CRC Press, October 1996.
5.
H. Deng, W. Li and D. P. Agrawal, Routing security in wireless adhoc networks, IEEE Commun. Mag., 40(10): 70-75, October 2002.
6.
Biswas, Suparna, and Subhajit Adhikari. "A Survey of Security Attacks, Defenses and Security Mechanisms in Wireless Sensor Network."International Journal of Computer Applications 131.17 (2015): 28-35.
7.
Ramakrishnan, B., R. S. Rajesh, and R. S. Shaji. "An efficient vehicular communication outside the city environments." International Journal of Next-Generation Networks (IJNGN) Vol 2 (2010).
8.
B.Ramakrishnan.,M.selvi,R.BhagavanthNishanth “Efficient Measure Of Routing Protocols In Vehicular Ad Hoc Networks Using Freeway Mobility Modelâ€, Wireless Networks, PP: 1-11 (2015).
9.
Ramakrishnan, B. "Performance analysis of AODV routing protocol in Vehicular ad-hoc network service discovery architecture." Network 13.14 (2009): 65-72.
10.
Joe, M. Milton, B. Ramakrishnan, and R. S. Shaji. "Modeling GSM based network communication in vehicular network." International Journal of Computer Network and Information Security 6.3 (2014): 37.
11.
TaoShuand Marwan Krunz,“Privacy Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Adhoc Networksâ€,IEEE Transactions on Mobile Computing, Vol.14,no.4,April 2015.
12.
B.Awerbuch,R.Curtmola,D.Holmer,C.Nita-Rotaru, and H.Rubens, “ODSBR: An on demand secure byzantine resilient routing protocol for wireless ad hoc networksâ€,ACMTrans.InformSyst.Security,vol.10.no.4,pp.1-35,2008.
13.
K.Balakrishnan, J.Dengand, P.K.Varshney, “TWOACK Preventing selfishness in mobile ad hoc networks,†in Proc. IEEEWirelessCommun Network Conf., 2005, pp.2137-2142.
14.
E.GerhardsPadilla,N.Aschenbruck,P.Martini,M.Jahnke and J.Tolle. “Detecting Black Hole Attacks in Tactical MANETs using Topology Graphsâ€, InProc. Of the 33rd IEEE Conference on Local Computer Networks (LCN), Dublin,Ireland, and October 2007.
15.
DaÅŸ, R., Karabade, A., Tuna, G., (2015), “Common Network Attack Types and Defense Mechanismsâ€, IEEE 23. Signal Processing Applications Conference (SÄ°U-2015), 16-19 May 2015, InonuUniversity, Malatya.
16.
W.Yu,Y.Sun and K.R.liu ,HADOF:Defense Against Routing Disruptions in mobile ad hoc networks,InProc.24thIEEEINFOCOM,Miami,USA,March 2005.
17.
Ramakrishnan, B., S. R. Sreedivya, and M. Selvi. "Adaptive routing protocol based on cuckoo search algorithm (ARP-CS) for secured vehicular ad hoc network (VANET)." International Journal of computer networks and applications (IJCNA) 2.4 (2015): 173-178.
18.
Merlyn, A. Anuba, and A. Anuja Merlyn. "Energy Efficient Routing (EER) For Reducing Congestion and Time Delay in Wireless Sensor Network." International Journal of Computer Networks and Applications 1.1 (2014): 1-10.
19.
Baykara, M., DaÅŸ, R., (2015)."A Survey on Potential Applications of Honeypot Technology in Intrusion Detection Systems", International Journal of Computer Networks and Applications (IJCNA), 2(5), 203-211.
20.
Shaji, R. S., R. S. Rajesh, and B. Ramakrishnan. "An Efficient Routing scheme for reliable path establishment among Mobile Devices in Heterogeneous Networksâ€, International Journal of Computer Science and Information Technologies, Vol. 1 (5) , 2010, 355-362.
21.
Namesh, C., and Dr B. Ramakrishnan. "Analysis of VBF protocol in Underwater Sensor Network for Static and Moving Nodes." International Journal of Computer Networks and Applications 2.1 (2015): 20-26..
22.
Nishanth, R. Bhagavath, B. Ramakrishnan, and M. Selvi. "Improved signcryption algorithm for information security in networks." International Journal of Computer Networks and Applications (IJCNA) 2.3 (2015): 151-157.
23.
Karadogan, Ä°., DaÅŸ, R., (2015). “Analysis of Attack Types on TCP/IP Based Networks via Exploiting Protocols)â€, IEEE 23. Signal Processing Applications Conference (SÄ°U-2015), 16-19 May 2015, Ä°nönü Ãœniversitesi, Malatya.