1. M. Abadi and C. Fournet. Access control based on execution history. InProceedings of the 10th Annual Network and Distributed System Security Symposium (NDSS), volume 3, pages 107--121. The Internet Society, 2003.
2. W. Adi. Mechatronic security and robot authentication.International Journal of Advanced Science and Technology, 14: 41--52, 2010.
3. M. Ancona, W. Cazzola, and E. B. Fernández. A history-dependent access control mechanism using reflection. InProceedings of the 5th ECOOP Workshop on Mobile Object Systems (MOS'99), 1999.
4. L. Atzori, A. Iera, and G. Morabito. The internet of things: A survey.Computer networks, 54(15): 2787--2805, 2010.
5. A. Bhargav-Spantzel, A. C. Squicciarini, R. Xue, and E. Bertino. Multifactor identity verification using aggregated proof of knowledge.Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on, 40(4): 372--383, 2010.