1. Sicaria, S., Rizzardia, A., Griecob, L. A., and Coen-Porisinia, A. 2015. Security, privacy and trust in Internet of Things: The road ahead. Computer Networks, 76, (Jan. 2015), 146--164. DOI= http//doi.org/10.1016/j.comnet.2014.11.008.
2. Chalasani S. and Conrad, J. M. 2008. A Survey of Energy Harvesting Sources for Embedded Systems. In Proceedings of IEEE SoutheastCon (Huntsville, USA, April 3-6, 2008). IEEE, 442--447. DOI= http:/doi.org/10.1109/SECON.2008.4494336.
3. Nicosia, A., Pau, D., Giacalone, D., Plebani, E., Bosco, A., and Iacchetti, A. 2018. Efficient Light Harvesting for Accurate Neural Classification of Human Activities. In Proceedings of IEEE International Conference on Consumer Electronics (Las Vegas, USA, January 12-14, 2018). ICCE 2018, IEEE. 1--4. DOI= http//doi.org/10.1109/ICCE.2018.8326103.
4. Lee, J.W., Lim, D., Gassend, B., Suh, G.E., van Dijk, M., and Devadas, S. 2004. A technique to build a secret key in integrated circuits for identification and authentication applications. In Proceedings of 2004 Symposium on VLSI Circuits (Hawaii, USA, June 17-19, 2004). IEEE. 176--179. DOI= http://doi.org/10.1109/VLSIC.2004.1346548.
5. Suh, G. E. and Devadas, S. 2007. Physical unclonable functions for device authentication and secret key generation. In Proceedings of the 44th annual Design Automation Conference (San Diego, USA, June 04--08, 2007). DAC'07, ACM, 9--14. DOI= https://doi.org/10.1145/1278480.1278484.