1. Security, privacy and trust in Internet of Things: The road ahead
2. Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues
3. Realization of a scalable Shor algorithm
4. NIST, Report on post-quantum cryptography, NISTIR 8105 DRAFT, available at http://csrc.nist.gov/publications/drafts/nistir-8105/Nistir8105draft.pdf [Accessed on October 4th, 2016].
5. A. Daniel et al., “Initial recommendations of long-term secure post-quantum systems,” available at http://pqcrypto.eu.org/docs/initial-recommendations.pdf [Accessed on October 4th, 2016], 2015.