1. Razy Youhana Adam and Weizhi Meng. 2023. Securing 5G Positioning via Zero Trust Architecture. In Artificial Intelligence Security and Privacy - First International Conference on Artificial Intelligence Security and Privacy, (AIS&P) (Lecture Notes in Computer Science), Vol. 14509. Springer, 563--578.
2. Md Tanvir Arafin and Gang Qu. 2021. Hardware-based authentication applications. Authentication of Embedded Devices: Technologies, Protocols and Emerging Applications (2021), 145--181.
3. The Zero-Trust Mandate: Never Trust Continually Verify.[J];Bogner E;Software World,2019
4. He Fang, Xianbin Wang, Naofal Al-Dhahir, and Robert Schober. 2023. Joint Design of Multi-Dimensional Multiple Access and Lightweight Continuous Authentication in Zero-Trust Environments. In IEEE Global Communications Conference, GLOBECOM 2023, Kuala Lumpur, Malaysia, December 4-8, 2023. IEEE, 3366--3371.
5. A Zero-Trust Architecture for Remote Access in Industrial IoT Infrastructures