[1]
A. G. . D. Usha, “Security Level Key Management Methodologies in IoT mode operations”, Int J Intell Syst Appl Eng, vol. 12, no. 3, pp. 1305–1314, Mar. 2024.