1. Arash Afshar, Zhangxiang Hu, Payman Mohassel, and Mike Rosulek. 2015. How to efficiently evaluate RAM programs with malicious security. In Advances in Cryptology—EUROCRYPT 2015. Lecture Notes in Computer Science, Vol. 9056. Springer, 702–729.
2. A survey on 5G networks for the Internet of Things: Communication technologies and challenges;Akpakwu Godfrey Anuga;IEEE Access,2017
3. Taking advantage of jamming in wireless networks: A survey;Al-Mefleh Haithem;Computer Networks,2016
4. Giuseppe Ateniese, Giuseppe Bianchi, Angelo Capossele, and Chiara Petrioli. 2013. Low-cost standard signatures in wireless sensor networks: A case for reviving pre-computation techniques? In Proceedings of the 20th Annual Network and Distributed System Security Symposium (NDSS ’13).
5. The Internet of Things: A survey;Atzori Luigi;Computer Networks,2010