1. Fotiou N Marias GF Polyzos GC 2012
2. An integrated authentication and authorization approach for the network of information architecture;Aiash;J Netw Comput Appl,2014
3. Wang Y Xu M Feng Z Li Q Li Q 2014
4. AbdAllah EG Zulkernine M Hassanein HS 2016
5. Kurihara J Uzun E Wood CA 2015 https://www.ietf.org/mail-archive/web/icnrg/current/pdf9_JIQ5GBeS.pdf. Accessed June 6