a.eu/public/requirements, [accessed: 201 3 - 06 - 21],
2013
[ITU-IOT] the Internet of Things summary at ITU, online at:
http://www.itu.int/osg/spu/publications/internetofthings/I
nternetofThings_summary.pdf
[ITU-T 1997] ITU-T, "M.3400 TMN management functions", 1997
[Karlof 2003] Chris Karlof, David Wagner, Secure routing in wireless
sensor networks: attacks and countermeasures, Ad
Hoc Networks, Volume 1, Issues 2–3, September
2003, Pages 293- 315
[Koshizuka 2010] Noboru Koshizuka and Ken Sakamura: ―Ubiquitous ID:
Standards for Ubiquitous Computing and the Internet
of Things‖. IEEE Pervasive Computing,vol. 9, no. 4, pp.
98 - 101, Oct.-Dec. 2010.
[Kozel 2010] T. Kozel, ―BPMN mobilisation,‖ in Proceedings of the
European conference of systems: World Scientific and
Engineering Academy and Society (WSEAS), 2 010
[Kruchten 1995] Kruchten, Philippe B., ―The 4+1 View Model of
Architecture,‖ IEEE Software, Vol. 12, No. 6, pp. 42-50,
1995.
[Lefort 2005] L. Lefort, Ontology for Quantity Kinds and Units: units
and quantities definitions, W3 Semantic Sensor
Network Incubator Activity, 2005.
[Lewis 2009] Levis, Philip and Gay, David.TinyOS Programming. 1.
s.l. : Cambridge University Press, 2009. 0521896061.
[Lu 2005] Lu, B.; Pooch, U. W.; (2005), A Lightweight
Authentication Protocol for Mobile Ad Hoc Networks,
International Journal of Information Technology,
Volume 11(2).
[Magerkurth 2011] C. Magerkurth, K. Sperner, S. Meyer, M. Strohbach
―Towards Context-Aware Retail Environments: An
Infrastructure Perspective‖, Mobile Interaction in Retail
Environments (MIRE 2011), Stockholm, Sweden, 2011
[Martín 2012] Martín, G. (Ed.), ―Resource Description Specification‖,
IoT-A deliverable D2.1, 2012
[Mathur 2007] Mathur CN, Subbalakshmi KP, Security issues in
cognitive radio networks. In: Cognitive networks:
towards self-aware networks (2007)
[Menezes 1996] A. J. Menezes , S. A. Vanstone , P. C. Van Oorschot,
Handbook of Applied Cryptography, CRC Press, Inc.,
Boca Raton, FL, 1996.