1. Anonymous authentication for privacy-preserving iot target-driven applications;Alcaide;Comput Secur,2013
2. Non-intrusive user identity provisioning in the Internet of Things;Al-Karkhi,2014
3. Authorization for the Internet of Things using OAuth 2.0. https://tools.ietf.org/html/draft-ietf-ace-oauth-authz-01.
4. Comparing alternative approaches for networking of named objects in the future internet;Baid,2012
5. Federated system-to-service authentication and authorization combining PUFs and tokens;Beltrán,2017