[1] D. Bandyopadhyay and J. Sen, “Internet of Things: Applications and Challenges in Technology and Standardization”, Wireless Personal Communications, Vol.58, No.1, (2011), pp.49-69.
[2] D. Miorandi, S. Sicari, F. De Pellegrini and I. Chlamtac, “Internet of things: Vision, applications and research challenges”, Ad Hoc Network, Vol.10, No.7, (2012), pp.1495-1516.
[3] L. Coetzee and J. Eksteen, “The internet of things-promise for the future? An introduction”, Proceedings of the IST-Africa Conference, Gaborone, Botswana, (2011), pp.1-9.
[4] L. Atzori, A. Iera, and G. Morabito, “The internet of things: A survey”, Computer Networks, Vol.54, No.15, (2010), pp.2787-2805.
[5] J. Gubbia, R. Buyyab, S. Marusica and M. Palaniswamia, “Internet of Things (IoT): A vision, architectural elements, and future irections”, Future Generation Computer Systems, Vol.29, No.7, (2013), pp.1645-1660.
[6] C.Sarma, Amardeo and J. Girao, “Identities in the future internet of things”, Wireless personal communications, Vol.49, No.3, (2009), pp.353-363.
[7] Jeff Dean, “Handling Large Datasets at Google: Current Systems and Future Directions”, Data-Intensive Computing Symposium, (2008).
[8] A. Shamir, “How to share secret”, Communications of the ACM, Vol.22, No.11, (1979), pp.612-613.
[9] J. Kurihara, S. Kiyomoto, K. Fukushima, and T. Tanaka, “On a Fast (k,n)-Threshold Secret Sharing Scheme”, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.91, No.9, (2008), pp.2365-2377.
[10] C. Cachin, “On-line Secret Sharing”, Proceedings of the IMA International Conference on Cryptography and Coding, Vol.1025, (1995), pp.190-198.
[11] A. K. Dey, D. Salber, G. D. Abowd, M. Futakawa, “Providing Architectural Support for Context-Aware applications”, PhD thesis Georgia Institute of Technology, (2000).
[12] Beimel, Amos and Yuval Ishai, “On the power of nonlinear secret-sharing”, SIAM Journal on Discrete Mathematics, Vol.19, No.1, (2005), pp.258-280.