T Aihkisalo, "Latencies of Service Invocation and Processing of the REST and SOAP Web Service Interfaces," in IEEE Eighth World Congress on Services, 2012, pp. 100-107.
 Hiro Gabriel, Cerqueira Ferreira, and Edna Dias Canedo, "IoT Architecture to Enable Intercommunication Through REST API a nd U PnP U sing IP, ZigBee a nd Arduino," in 1 st International Workshop on Internet of Things Communications and Technologies (IoT'13), 2013, pp. 53 – 60.
 Jo. Juyeon, Kim. Yoohwan, and Lee Sungchul, "Mindmetrics: Identifying users without their login IDs," in IEEE International Conference on Systems, Man and Cybernetics (SMC), 2014, pp. 2121 - 2126.
 Matthias Kovatsch, Martin Lanter, and Zach Shelby, "Californium: Scalable Cloud Services for the Internet of Things with CoAP," in 4th International Conference on the Internet of Things (IoT 2014), 2014.
 Z. Shelby, K. Hartke, C. Bormann, and B. Frank, "Constrained Application Protocol (CoAP). draft-ietf-core-coap-12," 2012.
 Mahdi Aiash, "Security Analysis of the Constrained Application Protocol in the Internet of Things," , 2013.
 OASIS. (2008, March) OASIS. [Online]. www.oasis-open.org/committees/download.php/27819/sstc-saml-tech-overview-2.0-cd-02.pdf
 M. Ali, T. S. Sobh, and S. EL-Gamal, "Identity Management: Lightweight SAML for Less Processing Power," I.J. Information Technology and Computer Science, pp. 42-49, 2015.
 IEEE Internet Initiative, "Towards a definition of the Internet of Things (IoT)," 2015.
 D. Booth et al. (2004) Web Services Architecture. [Online]. http://www.w3.org/TR/2004/NOTE-ws-arch-20040211/
 G Moritz, F. Golatowski, and D Timmermann, "A Lightweight SOAP over CoAP Transport Binding for Resource Constraint Networks," in Eighth IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2011, pp. 861 - 867.
 B. Negasha, A. Rahmani, T Westerlunda, P. Liljeberg, and H. Tenhunena, "LISA: Lightweight Internet of Things Service Bus Architecture ," in The 6th International Conference on Ambient Systems, Networks and Technologies , 2015.
 R. Shirey. (2010) Network Working Group. [Online]. https://www.ietf.org/rfc/rfc2828.txt
 Yinzhi Cao et al., "Protecting Web-Based Single Sign-on Protocols against Relying Party Impersonation Attacks through a Dedicated Bi-directional Authenticated Secure Channel," in Research in Attacks, Intrusions and Defenses.: Springer International Publishing , 2014, pp. 276-298.
 D. Hardt. (2012) Internet Engineering Task Force (IETF). [Online]. https://datatracker.ietf.org/doc/rfc6749/
 Kohlar.F and Schwenk.J Sovis.P, "Security analysis of OpenID," in Proceedings of the Securing Electronic Business Processes-Highlights of the Information Security Solutions Europe 2010 Conference, 2010.
 P. Wang, X. Wu, and H. Yang, "Analysis of the efficiency of data transmission format based on Ajax applications," in nternational Conference of Information Technology, Computer Engineering and Management Sciences, 2011, pp. 265-268.
 N. Nurseitov, M. Paulson, and P. Reynol, "Comparison of JSON and XML Data Interchange Formats: A Case Study," in Computers and Their Applications in Industry and Engineering, 2009.
 C. Bormann and P. Hoffman. (2013) RFC 7049 Internet Engineering Task Force. [Online]. https:lltools.ietf.org/html/rfc7049
 J. Schaad. (2016, Jan.) CBOR Object Signing and Encryption (COSE). [Online]. https://tools.ietf.org/id/draft-ietf-cose-msg-24.txt
 The Eclipse Foundation. (2014) Californium (Cf) CoAP framework. [Online]. https://www.eclipse.org/californium/