1. Hardware low power implementation of attribute-based encryption;Abdel-Aziz,2016
2. Location-enhanced authentication using the iot: because you cannot be in two places at once;Agadakos,2016
3. Internet of things: a survey on enabling technologies, protocols, and applications;Al-Fuqaha;IEEE Commun. Surv. Tutorials,2015
4. Privacy and Security Issues in IoT Healthcare Applications for the Disabled Users a Survey;AL-mawee,2012
5. Internet of things security: a survey;Alaba;J. Netw. Comput. Appl.,2017