REFERENCES
1.
S. K. Garg,
“Review of Secured Routing for Wireless Ad hoc Network”, International Journal
of Computing and Business Research, 2 (1), 2011
2.
S. K. Garg,
“Wireless Network Security Threats”, International Journal of Information
Dissemination and Technology, 1(2), 2011
3.
W.
Stallings, Cryptography and Network Security : Principles and Practices, 5th
Edition 2005
4.
T. Karygiannis
and L. Owens, Wireless Communication, National Institute of Standard and
Technology, U.S. Department of Computer (2001)
5.
S. K. Garg,
“Cryptography Using Controlled NOT Gate : Algorithm SKG 3.00”, International
Journal of Electronics Engineering, 6 (1), 20-24, 2014
6.
S. K. Garg,
“Information Security By Interchanging Characters: Algorithm SKG 1.0”, International Journal of IT &Knowledge
Management, 6 (2), 129-131, 2013
7.
S. K. Garg,
A. Gaur and S. P. Gupta, “Information Security Using Modulation Technique”,
International Journal Electronics and Communication Engineering &
Technology, 7 (1), 107-114, 2016
8.
S. K. Garg,
A. Gaur and S. P. Gupta, “Data Hiding and Retrieval Using Digital Signal”,
IPASJ International Journal of Electronics and Communication, 4(3), 1-5, 2016