key encryption techniques in
cryptography. International Journal
of Science, Engineering and
Technology Research
(IJSETR), 3(3), 539-544.
Staff. C. (2015). Cryptography Techniques
for Secure Communications.
Retrieved from
http://certmag.com/cryptography-
techniques-for-secure-
communications/.
Suri S., & Singh, Y. (2016). A Proposed
Cipher Technique with a Study of
Existing Cryptography Techniques.
Tassel. D. (2016). Cryptographic techniques
for computers. Retrieved from
https://www.computer.org/csdl/proce
edings/afips/1969/5073/00/50730367
.pdf.
Trilightzone. (2016). Cryptography in Daily
Life. Retrieved from
https://www.trilightzone.org/cryptog
raphy_in_daily_life.html
Tripathi, R., & Agrawal, S. (2014).
Comparative study of symmetric and
asymmetric cryptography
techniques. International Journal of
Advance Foundation and Research
in Computer (IJAFRC), 1(6), 68-76.
Tutorialspoint. (2015). Cryptography
Benefits & Drawbacks. Retrieved
from
https://www.tutorialspoint.com/crypt
ography/benefits_and_drawbacks.ht
m.
Upadhyaya, S. (2015). Secure
communication using DNA
cryptography with secure socket
layer (SSL) protocol in wireless
sensor networks. Procedia Computer
Science, 70, 808-813.
Utexas. (2017). Cryptography in Everyday
Life. Retrieved from
http://www.laits.utexas.edu/~anorma
n/BUS.FOR/course.mat/SSim/life.ht
ml.
Vijayakumar, P., Indupriya, S., & Rajashree,
R. (2016). A hybrid multilevel
security scheme using