D. Lund, C. Macgillivray, V. Turner, and M. Morales, Worldwide and Regional Internet of Things (IoT) 2014-2020 Forecast: A Virtuous Circle of proven Value and Demand, vol.248451, 2014.

S. Ziebland, A. Chapple, C. Dumelow, J. Evans, S. Prinjha et al., How the internet affects patients' experience of cancer: a qualitative study, BMJ, vol.328, issue.7439, p.564, 2004.

B. Mckinstry, J. Hanley, S. Wild, C. Pagliari, M. Paterson et al., Telemonitoring based service redesign for the management of uncontrolled hypertension: multicentre randomised controlled trial, BMJ, vol.346, p.3030, 2013.

J. Kropff, D. Favero, S. Place, J. Toffanin, C. Visentin et al., AP@home consortium. 2 month evening and night closed-loop glucose control in patients with type 1 diabetes under free-living conditions: a randomised crossover trial, Lancet Diabetes Endocrinol, vol.3, issue.12, pp.939-986, 2015.

H. Thabit, M. Tauschmann, J. M. Allen, L. Leelarathna, S. Hartnell et al., Hovorka R; APCam Consortium; AP@home Consortium. Home Use of an Artificial Beta Cell in Type 1 Diabetes, N Engl J Med, vol.373, issue.22, pp.2129-2169, 2015.

D. M. Bravata, C. Smith-spangler, V. Sundaram, A. L. Gienger, N. Lin et al., Using Pedometers to Increase Physical Activity and Improve Health -A Systematic Review, JAMA, vol.298, pp.2296-304, 2007.

S. Amendola, R. Lodato, S. Manzari, C. Occhiuzzi, and G. Marrocco, RFID Technology for IoT-Based Personal Healthcare in Smart Spaces, IEEE Internet of Things Journal, vol.1, issue.2, pp.144-52, 2014.

M. A. Rassam, A. Zainal, and M. A. Maarof, Advancements of data anomaly detection research in wireless sensor networks: a survey and open issues, Sensors (Basel), vol.13, issue.8, pp.10087-122, 2013.

D. Oh, D. Kim, and W. W. Ro, A malicious pattern detection engine for embedded security systems in the Internet of Things, Sensors (Basel), vol.14, issue.12, pp.24188-211, 2014.

B. Ndibanje, H. J. Lee, and S. G. Lee, Security analysis and improvements of authentication and access control in the Internet of Things, Sensors (Basel), vol.14, issue.8, pp.14786-805, 2014.

S. Delaune, S. Kremer, and M. Ryan, Coercion-resistance and receipt-freeness in electronic voting, the Proceedings of the 19th IEEE Computer Security Foundations Workshop, pp.28-39, 2006.

R. E. Glasgow, T. M. Vogt, S. M. Boles, and S. M. Boles, Evaluating the public health impact of health promotion interventions: the RE-AIM framework, Am J Public Health, vol.89, issue.9, pp.1322-1329, 1999.

E. I. Konstantinidis, G. Bamparopoulos, A. Billis, and P. D. Bamidis, Internet of things for an age-friendly healthcare, Stud Health Technol Inform, vol.210, pp.587-91, 2015.

L. M. Gawron and D. K. Turok, Pills on the World Wide Web: reducing barriers through technology, Am J Obstet Gynecol, vol.213, issue.4, pp.500-501, 2015.

D. Booth, Internet of things builds capacity for automatic temperature logging, J Environ Health, vol.77, issue.10, pp.34-40, 2015.

P. Hustinx, Privacy by design: delivering the promises, Identity in the Information Society, vol.3, issue.2, pp.253-258, 2010.

L. Tien, Privacy in the Mobile Health Context: What Could Go Wrong? Electronic Frontier Foundation, 2017.

L. Ohno-machado, S. Wang, X. Wang, A. Iranmehr, X. Jiang et al., Security, and Machine Learning for Mobile Health Applications, 2017.

H. Tang, X. Liu, and L. Jiang, A Robust and Efficient Timestamp-based Remote User Authentication Scheme with Smart Card Lost Attack Resistance, IJ Netw Secur, vol.15, pp.446-54, 2013.