1. Nguyen, T.-D., Al-Saffar, A., & Huh, E. N. (2010). A dynamic id-based authentication scheme. In The 6th international conference on networked computing and advanced information management (pp. 248–253).
2. Katusic, D., Weber, M., Bojic, I., Jezic, G., & Kusek, M. (2012). Market, standardization, and regulation development in machine-to-machine communications. In SoftCOM 2012, 20th international conference on software, telecommunications and computer networks (pp. 1–7).
3. Feki, M. A., Kawsar, F., Boussard, M., & Trappeniers, L. (2013). The internet of things: The next technological revolution. Computer, 46, 24–25.
4. Roggen, D., Troster, G., Lukowicz, P., Ferscha, A., Millan, J. del R., & Chavarriaga, R. (2013). Opportunistic human activity and context recognition. Computer, 46(2), 36–45.
5. Stoica, I., Morris, R., Karger, D., Kaashoek, M. F., & Balakrishnan, H. (2001). Chord: A scalable peer-to-peer lookup service for internet applications. In Proceedings of the 2001 conference on applications, technologies, architectures, and protocols for computer communications, SIGCOMM ’01 (pp. 149–160). New York, NY, USA: ACM.