N. Apthorpe, D. Reisman, and N. Feamster, Closing the blinds: Four strategies for protecting smart home privacy from network observers, 2017.

N. Apthorpe, D. Reisman, and N. Feamster, A smart home is no castle: Privacy vulnerabilities of encrypted IoT traffic, 2017.

J. Bohn, Instant personalization and temporary ownership of handheld devices, Mobile Computing Systems and Applications, 2004. WMCSA 2004. Sixth IEEE Workshop on, pp.134-143, 2004.

L. Ertaul, A. Mudan, and N. Sarfaraz, Performance comparison of AES-CCM and AES-GCM authenticated encryption modes, Proceedings of the International Conference on Security and Management (SAM), p.331, 2016.

L. Francis, G. Hancke, K. Mayes, and K. Markantonakis, Practical NFC peer-to-peer relay attack using mobile phones, International Workshop on Radio Frequency Identification: Security and Privacy Issues, pp.35-49, 2010.

D. Giry, Keylength -NIST report on cryptographic key length and cryptoperiod, 2016.

J. Hu and A. C. Weaver, A dynamic, context-aware security infrastructure for distributed healthcare applications, Proceedings of the first workshop on pervasive privacy security, privacy, and trust, pp.1-8, 2004.

W. R. Jih, S. Y. Cheng, J. Y. Hsu, and T. M. Tsai, Context-aware access control in pervasive healthcare, Computer Science and Information Engineering, 2005.

V. Kapsalis, L. Hadellis, D. Karelis, and S. Koubias, A dynamic context-aware access control architecture for e-services, computers & security, vol.25, issue.7, pp.507-521, 2006.

M. Khan, Enhancing privacy in IoT devices through automated handling of ownership change, 2017.

Y. Kumar, R. Munjal, and H. Sharma, Comparison of symmetric and asymmetric cryptography with existing vulnerabilities and countermeasures, International Journal of Computer Science and Management Studies, vol.11, issue.03, 2011.

A. K. Lenstra and E. R. Verheul, Selecting cryptographic key sizes, Journal of cryptology, vol.14, issue.4, pp.255-293, 2001.

D. Mcgrew and D. Bailey, AES-CCM cipher suites for Transport Layer Security (TLS), 2012.

M. Miettinen, N. Asokan, T. D. Nguyen, A. R. Sadeghi, and M. Sobhani, Contextbased zero-interaction pairing and key evolution for advanced personal devices, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp.880-891, 2014.

M. Miettinen, S. Heuser, W. Kronz, A. R. Sadeghi, and N. Asokan, ConXsense: automated context classification for context-aware access control, Proceedings of the 9th ACM symposium on information, computer and communications security, pp.293-304, 2014.

M. Miettinen, S. Marchal, I. Hafeez, N. Asokan, A. R. Sadeghi et al., IoT Sentinel: Automated Device-Type Identification for Security Enforcement in IoT, 2016.

B. Pradeep and S. Singh, Ownership authentication transfer protocol for ubiquitous computing devices, 2012.

B. Ren, C. Liu, B. Cheng, S. Hong, S. Zhao et al., Easyguard: enhanced context-aware adaptive access control system for android platform: poster, Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, pp.458-459, 2016.

E. Rescorla, RFC 2631 -Diffie-Hellman key agreement method, 1999.

B. Shrestha, N. Saxena, H. T. Truong, and N. Asokan, Contextual proximity detection in the face of context-manipulating adversaries, 2015.

P. Tam and J. Newmarch, Protocol for ownership of physical objects in ubiquitous computing environments, IADIS international conference E-Society, pp.614-621, 2004.

A. Valiev, Automatic ownership change detection for IoT devices

D. Whiting, R. Housley, and N. Ferguson, Counter with cbc-mac (ccm), 2003.

C. Wullems, M. Looi, and A. Clark, Towards context-aware security: An authorization architecture for intranet environments, Proceedings of the Second IEEE Annual Conference on, pp.132-137, 2004.

G. Zhang and M. Parashar, Context-aware dynamic access control for pervasive applications, Proceedings of the Communication Networks and Distributed Systems Modeling and Simulation Conference, pp.21-30, 2004.

L. Zhang and W. C. Mcdowell, Am i really at risk? determinants of online users' intentions to use strong passwords, Journal of Internet Commerce, vol.8, issue.3-4, pp.180-197, 2009.