[1]
M. Xu. Gaochao. Distributed Computing Systems, Beijing: High Education Press., pp. 124C141, January (2004).
Google Scholar
[2]
Lin Zi, Shi Wen Xiao, Wang Li, A study and analysis on a high intensity public data encryption algorithm, CA: Proceedings of the 3th World Congress on Intelligent Control and Automation, (2000).
DOI: 10.1109/wcica.2000.862493
Google Scholar
[3]
Elbirt A.J., Yip W., Chetwynd B., Paar C.: An FPGA Implementation and Performance Evaluation of the AES Block Cipher Candidate Algorithm Finalists, Third Advanced Encryption Standard (AES3) Candidate Conference, New York, (2000).
DOI: 10.1109/92.931230
Google Scholar
[4]
Gaj K. and Chodowiec P.: Comparison of the hardware performance of the AES candidates using reconfigurable hardware, Third Advanced Encryption Standard (AES3) Candidate Conference, New York, (2000).
Google Scholar
[5]
Liao Hsien-Chou, Chao Yun-Hsiang, A new data encryption algorithm based on the location of mobile users, JA: Information Technology Journal, vol. 7, pp.63-69, (2008).
DOI: 10.3923/itj.2008.63.69
Google Scholar
[6]
Nadeem Aamer, Javed M. Younus, A performance comparison of data encryption algorithms, CA: 1st International Conference on Information and Communication Technology, vol. 2005, pp.84-89, (2005).
DOI: 10.1109/icict.2005.1598556
Google Scholar
[7]
Yee Wei Law, Jeroen Doumen, Pieter Hartel, Survey and Benchmark of Block Ciphers for Wireless Sensor Networks [J]. ACM Transactions on Sensor Networks, 8(2): 65-93, (2006).
DOI: 10.1145/1138127.1138130
Google Scholar