REFERENCES:
1. S. K. Garg, “Review of Secured Routing for Wireless Ad hoc Network”, International Journal of Computing and Business Research, 2 (1), 2011
2. S. K. Garg, “Wireless Network Security Threats”, International Journal of Information Dissemination and Technology, 1(2), 2011
3. W. Stallings, Cryptography and Network Security
: Principles and Practices, 5th Edition 2005
4. T. Karygiannis and L. Owens, Wireless Communication, National Institute of Standard and Technology, U.S. Department of Computer (2001)
5. S. K. Garg, “Cryptography Using Controlled
NOT Gate : Algorithm SKG 3.00”, International Journal of Electronics Engineering, 6 (1), 20-24, 2014
6. S. K. Garg, “Modified Encryption and Decryption Using Symmetric Keys at Two Stages : Algorithm SKG 1.2” , International Journal
of Advance Research
in Computer Science
and Software Engineering , 4
(6), 778-780, 2014
7. S. K. Garg, “Encryption Scheme For Secure
Routing Through Internet
: Algorithm SKG 2.5”, International Journal of Informative and Futuristic Research, 2 (2), 285-289,
2014
8. S. K. Garg, A. Gaur and S. P. Gupta, “Information Security Using Modulation Technique”, International Journal Electronics and Communication Engineering and Technology, 7 (1), 107-114,
2016
9. S. K. Garg, A. Gaur and S. P. Gupta, “Data Hiding and Retrieval Using Digital Signal”,
IPASJ International Journal
of Electronics & Communication, 4(3), 1-5, 2016