1. Cha I, Shah Y, Schmidt AU et al (2009) Trust in M2M communication. Veh Technol Mag 4(3):69–571
2. Cox L, Dalton A, Marupadi V (2015) SmokeScreen: flexible privacy controls for presence-sharing. In: Proceedings of the 5th international conference on mobile systems applications and services, pp. 233–245
3. Crypto++ Library (2012)
http://www.cryptopp.com
. Accessed 12 Aug 2017
4. Dolev D, Yao A (1983) On the security of public key protocols. IEEE Trans Inf Theory 29(2):198–208
5. Douglas RS (1994) Universal hashing and authentication codes. Des Codes Cryptogr 4(4):369–380