1. Alexandre Braga , Cecilia Rubira , and Ricardo Dahab . 1998 . Tropyc: A pattern language for cryptographic object-oriented software. Pattern Languages of Program Design 4 (1998). Alexandre Braga, Cecilia Rubira, and Ricardo Dahab. 1998. Tropyc: A pattern language for cryptographic object-oriented software. Pattern Languages of Program Design 4 (1998).
2. Mihaela Cardei Eduardo B. Fernandez Anupama Sahu and Ionut Cardei. 2011. A pattern for sensor network architectures Vol. 2011. 1-8. https://doi.org/10.1145/2524629.2524641 10.1145/2524629.2524641
3. Mihaela Cardei Eduardo B. Fernandez Anupama Sahu and Ionut Cardei. 2011. A pattern for sensor network architectures Vol. 2011. 1-8. https://doi.org/10.1145/2524629.2524641
4. Mohammed El-hajj, Chamoun Maroun , Ahmad Fadlallah , and Ahmed Serhrouchni . 2017 . Analysis of authentication techniques in Internet of Things (IoT) . In 2017 1st Cyber Security in Networking Conference (CSNet). 1–3. Mohammed El-hajj, Chamoun Maroun, Ahmad Fadlallah, and Ahmed Serhrouchni. 2017. Analysis of authentication techniques in Internet of Things (IoT). In 2017 1st Cyber Security in Networking Conference (CSNet). 1–3.
5. Eduardo B. Fernandez . 2013. Security Patterns in Practice: Designing Secure Architectures Using Software Patterns ( 1 st ed.). Wiley Publishing . Eduardo B. Fernandez. 2013. Security Patterns in Practice: Designing Secure Architectures Using Software Patterns (1st ed.). Wiley Publishing.