1. Hulsebosch, H., Lenzini, G., Eertink, H.: Quality of authenticator scheme. Technical Report Public Deliverable D2.3, STORK - Secure Identity Across Borders Linked (2009), http://www.eid-stork.eu/dmdocuments/D2.3_final._1.pdf
2. Hesselman, C., Eertink, H., Wibbels, M., Sheikh, K., Tokmakoff, A.: Controlled disclosure of context information across ubiquitous computing domains. In: Proc. IEEE Int. Conf. on Sensor Networks Ubiquitous, and Trustworthy Computing (STUC 2008), Taichun, Taiwan, pp. 98–105. IEEE Computer Society, Los Alamitos (2008)
3. Jøsang, A.: A logic for uncertain probabilities. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 9(3), 279–312 (2001)
4. Lenzini, G.: Design of architectures for proximity-aware services: Experiments in context- based authentication with subjective logic. In: Proc. of the 4th Int. Work. on Views on Design of Complex Architectures (VODCA 2008), Bertinoro, Italy, August 30-31 (2008)
5. Electronic Notes in Theoretical Computer Science;G. Lenzini,2008