The following publications are possibly variants of this publication:
- Challenges of Multi-Factor Authentication for Securing Advanced IoT ApplicationsAleksandr Ometov, Vitaly Petrov, Sergey Bezzateev, Sergey Andreev 0001, Yevgeni Koucheryavy, Mario Gerla. network, 33(2):82-88, 2019. [doi]
- How Matching Theory Enables Multi-access Edge Computing Adaptive Task Scheduling in IIoTJiancheng Chi, Chao Xu, Tie Qiu 0001, Di Jin 0001, Zhaolong Ning, Mahmoud Daneshmand. network, 37(3):126-131, May / June 2023. [doi]