[1]
“Implementasi Mekanisme End-To-End Security pada IoT Middleware”, JTIIK, vol. 6, no. 3, pp. 335–340, May 2019, doi: 10.25126/jtiik.2019631401.