1 I. R. Chen, "Trust-based service management for social internet of things systems" 13 (13): 684-696, 2016
2 Vera Suryani, "Internet of Things (IoT) Framework for Granting Trust among Objects" 한국정보처리학회 13 (13): 1613-1627, 2017
3 Y. Mao, "Fully secure fuzzy identity-based encryption for secure IoT communications" 44 : 117-121, 2016
4 J. D. Bokefode, "Developing a secure cloud storage system for storing IoT data by applying role based encryption" 89 : 43-50, 2016
5 V. Suryani, "ConTrust : a trust model to enhance the privacy in Internet of Things" 10 (10): 30-37, 2017
6 H. Kim, "Authentication and authorization for the Internet of Things" 19 (19): 27-33, 2017
7 Z. A. Khan, "A trust based distributed intrusion detection mechanism for Internet of Things" 1169-1176, 2017
8 F. Wu, "A privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security" 8 (8): 101-116, 2017
1 I. R. Chen, "Trust-based service management for social internet of things systems" 13 (13): 684-696, 2016
2 Vera Suryani, "Internet of Things (IoT) Framework for Granting Trust among Objects" 한국정보처리학회 13 (13): 1613-1627, 2017
3 Y. Mao, "Fully secure fuzzy identity-based encryption for secure IoT communications" 44 : 117-121, 2016
4 J. D. Bokefode, "Developing a secure cloud storage system for storing IoT data by applying role based encryption" 89 : 43-50, 2016
5 V. Suryani, "ConTrust : a trust model to enhance the privacy in Internet of Things" 10 (10): 30-37, 2017
6 H. Kim, "Authentication and authorization for the Internet of Things" 19 (19): 27-33, 2017
7 Z. A. Khan, "A trust based distributed intrusion detection mechanism for Internet of Things" 1169-1176, 2017
8 F. Wu, "A privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security" 8 (8): 101-116, 2017