1. Asthon K (2010) That internet of things Thing, RFID J., p 4986
2. Sahai A, Waters B (2005) Fuzzy identity-based encryption. Theory and applications of cryptographic techniques. Springer, Berlin Heidelberg, pp 457–473
3. Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of ACM conference computer communication security, pp 89–98
4. Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: IEEE symposium on security and privacy, IEEE, pp 321–334
5. Beimel A (1996) Secure schemes for secret sharing and key distribution. PhD thesis, Israel Institute of Technology, Technion, Haifa, Israel