[1]
A. Lee and . ., “Study of an Authentication Methods for IoT Services”, IJET, vol. 7, no. 3.34, pp. 602–605, Sep. 2018, doi: 10.14419/ijet.v7i3.34.19398.