1. PRE-Fog: ioT trace based probabilistic resource estimation at Fog;Aazam,2016
2. Password-based authenticated key exchange in the three-party setting;Abdalla,2005
3. A cooperative end to end key management scheme for e-health applications in the context of internet of things;Abdmeziem,2014
4. Intelligent algorithms and standards for interoperability in Internet of Things;Ahmad;Future Gen. Comp. Syst.,2019
5. Secure routing for internet of things: a survey;Airehrour;J. Netw. Comput. Appl.,2016