1 J. Su, "ePASS: an expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the internet of things" 33 : 11-18, 2014
2 A. B. Waluyo, "Trustworthy data delivery in mobile P2P network" 86 : 33-48, 2017
3 D. Conzon, "The VIRTUS middleware:an XMPP based architecture for secure IoT communications" 1-6, 2012
4 K. Kang, "Security and privacy mechanism for health internet of things" 20 (20): 64-68, 2013
5 R. Neisse, "SecKit: a model-based security toolkit for the internet of things" 54 : 60-76, 2015
6 L. Atzori, "SIoT : giving a social structure to the internet of things" 15 (15): 1193-1195, 2011
7 Z. Chen, "Privacy-preserving model of IoT based trust evaluation" E100-D (E100-D): 371-374, 2017
8 A. Samani, "Privacy in internet of things : a model and protection framework" 52 : 606-613, 2015
9 U. S. Premarathne, "Location-dependent disclosure risk based decision support framework for persistent authentication in pervasive computing applications" 88 : 161-177, 2015
10 H. Sato, "Establishing trust in the emerging era of IoT" 398-406, 2016
1 J. Su, "ePASS: an expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the internet of things" 33 : 11-18, 2014
2 A. B. Waluyo, "Trustworthy data delivery in mobile P2P network" 86 : 33-48, 2017
3 D. Conzon, "The VIRTUS middleware:an XMPP based architecture for secure IoT communications" 1-6, 2012
4 K. Kang, "Security and privacy mechanism for health internet of things" 20 (20): 64-68, 2013
5 R. Neisse, "SecKit: a model-based security toolkit for the internet of things" 54 : 60-76, 2015
6 L. Atzori, "SIoT : giving a social structure to the internet of things" 15 (15): 1193-1195, 2011
7 Z. Chen, "Privacy-preserving model of IoT based trust evaluation" E100-D (E100-D): 371-374, 2017
8 A. Samani, "Privacy in internet of things : a model and protection framework" 52 : 606-613, 2015
9 U. S. Premarathne, "Location-dependent disclosure risk based decision support framework for persistent authentication in pervasive computing applications" 88 : 161-177, 2015
10 H. Sato, "Establishing trust in the emerging era of IoT" 398-406, 2016
11 Subbian Umamaheswari, "Enhanced ANTSEC Framework with Cluster based Cooperative Caching in Mobile Ad Hoc Networks" 한국통신학회 17 (17): 40-46, 2015
12 V. Suryani, "ConTrust : a trust model to enhance the privacy in internet of things" 10 (10): 30-37, 2017
13 A. S. Tanenbaum, "Computer Network" Pearson Education Inc 2003
14 CASAGRAS Partnership, "CASAGRAS final report: RFID and the inclusive model for the internet of things" 2009
15 E. E. Zakaria, "An integrated security framework for access control and address auto-configuration for MANETs" 253-260, 2015
16 M. S. Farash, "An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the internet of things environment" 36 (36): 152-176, 2016
17 X. Xu, "An autonomic agent trust model for IoT systems" 21 : 107-113, 2013
18 C. Zhu, "A novel sensory data processing framework to integrate sensor networks with mobile cloud" 10 (10): 1125-1136, 2016
19 B. Zhang, "A novel multiple-level trust management framework for wireless sensor networks" 72 : 45-61, 2014
20 J. Wu, "A hierarchical security framework for defending against sophisticated attacks on wireless sensor networks in smart cities" 4 : 416-424, 2016
21 M. Henze, "A comprehensive approach to privacy in the cloud-based internet of things" 56 : 701-718, 2016
22 A. Sheikhi, "A cloud computing framework on demand side management game in smart energy hubs" 64 : 1007-1016, 2015