1. I. Ahmad, T. Kumar, M. Liyanage, J. Okwuibe, M. Ylianttila, and A. Gurtov. 2017. 5G Security: Analysis of Threats and Solutions. In Proc. IEEE Conference on Standards for Communications and Networking (CSCN). 193–199.
2. Award Solutions. 2019. Network Slicing | Webinar. https://www.youtube.com/watch?v=oNtZtseutQ0
3. 5G network slicing using SDN and NFV: A survey of taxonomy, architectures and future challenges
4. Short Signatures from the Weil Pairing
5. Ran Canetti and Susan Hohenberger. 2007. Chosen-Ciphertext Secure Proxy Re-Encryption. ACM Conference on Computer and Communications Security, 185–194.