1. What will 5G be?;Andrews;IEEE J Select Areas Commun,2014
2. Entity authentication and key distribution;Bellare,1993
3. An optimal class of symmetric key generation systems;Blom,1985
4. Fog computing and its role in the internet of things;Bonomi,2012
5. Analysis of key-exchange protocols and their use of building secure channels;Canetti,2001