1. Abadi M, Andersen DG (2016) Learning to protect communications with adversarial neural cryptography. arXiv:1610.06918
2. AdrainPerrig (1999) Efficient Collaborative key management protocols for secure autonomous group communication. In: International workshop on Cryptographic Techniques and Electronic Commerce. University of Hong Kong Press, pp 192–202
3. Bernardi D, Khouzani M, Malacaria MHR, et al (2019) Pseudo-Random Number Generation Using Generative Adversarial Networks. In: et al. ECML PKDD 2018 Workshops. ECML PKDD 2018, vol 11329. Springer
4. Boyd C, Mathuria A (2013) Protocols for Authentication and Key Establishment. Springer Books
5. Cao B, Sun Z, Zhang J et al (2021) Resource Allocation in 5G IoV Architecture Based on SDN and Fog-Cloud Computing. IEEE Trans Intell Transp Syst 22(6):3832–3840