1. Babamir, F. S., & Eslami, Z. (2012). Data security in unattended wireless sensor networks through aggregate signcryption. KSII Transactions on Internet and Information Systems (TIIS), 6(11), 2940–2955.
2. Babamir, F. S., & Norouzi, A. (2014). Achieving key privacy and invisibility for unattended wireless sensor networks in healthcare. The Computer Journal, 57(4), 624–635. doi:
10.1093/comjnl/bxt046
.
3. Bohli, J. M., Papadimitratos, P., Verardi, D., & Westhoff, D. (2011). Resilient data aggregation for unattended WSNs. In 2011 IEEE 36th conference on local computer networks (LCN) (pp. 994–1002). doi:
10.1109/LCN.2011.6114411
.
4. Chang, C. C., Huang, Y. C., & Tsai, H. C. (2014). Design and analysis of chameleon hashing based handover authentication scheme for wireless networks. Journal of Information Hiding and Multimedia Signal Processing, 5(1), 107–116.
5. Chang, F. C., & Huang, H. C. (2016). A survey on intelligent sensor network and its applications. Journal of Network Intelligence, 1(1), 1–15.