Ek Kaynak/Ek Okuma
Alenezi, M. N., Alabdulrazzaq, H., & Mohammad, N. Q. (2020). Symmetric encryption algorithms: Review and evaluation study. International Journal of Communication Networks and Information Security, 12(2), 256–272.
Dhall, H., Dhall, D., Batra, S., & Rani, P. (2012). Implementation of IPSec protocol. 2012 Second International Conference on Advanced Computing \& Communication Technologies, 176–181.
Ezra, P. J., Misra, S., Agrawal, A., Oluranti, J., Maskeliunas, R., & Damasevicius, R. (2022). Secured communication using virtual private network (VPN). Cyber Security and Digital Forensics: Proceedings of ICCSDF 2021, 309–319.
Ferguson, N., & Schneier, B. (1999). A cryptographic evaluation of IPsec.
Ferguson, P., & Huston, G. (1998). What is a VPN?
Gupta, P., & Kumar, S. (2014). A comparative analysis of SHA and MD5 algorithm. Architecture, 1(5).
Madson, C., & Glenn, R. (1998). The use of HMAC-MD5-96 within ESP and AH.
Miller, V. S. (1985). Use of elliptic curves in cryptography. Conference on the Theory and Application of Cryptographic Techniques, 417–426.
Mouha, N., Dworkin, M., & others. (2021). Review of the advanced encryption standard. Technical Report, National Institute of Standards and Technology.
Muttaqin, K., & Rahmadoni, J. (2020). Analysis and design of file security system AES (advanced encryption standard) cryptography based. Journal of Applied Engineering and Technological Science (JAETS), 1(2), 113–123.
Obaid, T. S. (2020). Study a public key in RSA algorithm. European Journal of Engineering and Technology Research, 5(4), 395–398.
Purohit, K., Kumar, A., Upadhyay, M., & Kumar, K. (2020). Symmetric key generation and distribution using Diffie-Hellman algorithm. In Soft Computing: Theories and Applications: Proceedings of SoCTA 2019 (pp. 135–141). Springer.
Rathore, M. S., Razzaq, A., Hidell, M., & Sjödin, P. (2009). Site-to-Site VPN Technologies: A Survey.
Santoso, B., Sani, A., Husain, T., & Hendri, N. (2021). VPN Site To Site Implementation Using Protocol L2TP And IPSec. TEKNOKOM, 4(1), 30–36.
Shneyderman, A., & Casati, A. (2003). Mobile VPN: delivering advanced services in next generation wireless systems. John Wiley \& Sons.
Su, N., Zhang, Y., & Li, M. (2019). Research on data encryption standard based on aes algorithm in internet of things environment. 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), 2071–2075.
Yong-Xia, Z., & Ge, Z. (2010). MD5 research. 2010 Second International Conference on Multimedia and Information Technology, 2, 271–273.
OKUMA LİSTESİ
· Kaya ve İ. Türkoğlu , "Simetrik ve Asimetrik Şifreleme Algoritmalarının Performans Karşılaştırılması", Fırat Üniversitesi Mühendislik Bilimleri Dergisi, c. 35, sayı. 2, ss. 891-900, Eyl. 2023, doi:10.35234/fumbd.1296228
· Yerlikaya, T. , Gençoğlu, H. , Emir, M. K. , Çankaya, M. & Buluş, E. (2011). RSA ŞİFRELEME ALGORİTMASI VE ARİTMETİK MODÜL UYGULAMASI . İstanbul Aydın Üniversitesi Dergisi , 3 (9) , 95-104 . Retrieved from https://dergipark.org.tr/tr/pub/iaud/issue/30054/324501
· Beşkirli, A. , Özdemir, D. & Beşkirli, M. (2019). Şifreleme Yöntemleri ve RSA Algoritması Üzerine Bir İnceleme . Avrupa Bilim ve Teknoloji Dergisi , Özel Sayı 2019 , 284-291 . DOI: 10.31590/ejosat.638090
· T. Yerlikaya ve N. İşçimen , "ASİMETRİK ŞİFRELEMEDE ASAL SAYILAR VE GÜVENLİK", Trakya Üniversitesi Mühendislik Bilimleri Dergisi, c. 24, sayı. 1, ss. 11-18, Tem. 2023, doi:10.59314/tujes.1303091
· Çelik, S. (2021). Kuantum Kriptolojisi ve Siber Güvenlik . Bilişim Teknolojileri Dergisi , 14 (1) , 53-64 . DOI: 10.17671/gazibtd.733309