[1] | M. Walshy, “Gartner: Mobile to outpace desktop web by 2013,” Online Media Daily, January 2010. |
|
[2] | D. Huang, X. Zhang, M. Kang, and J. Luo, “Mobicloud: A secure mobile cloud framework for pervasive mobile computing and communication,” in Proceedings of 5th IEEE International Symposium on ServiceOriented System Engineering, 2010. |
|
[3] | X. Zhang, J. Schiffman, S. Gibbs, A. Kunjithapatham, and S. Jeong, “Securing elastic applications on mobile devices for cloud computing,” in Proceedings of the ACM workshop on Cloud computing security, 2009. |
|
[4] | J. Lockwood, N. McKeown, G. Watson, G. Gibb, P. Hartke, J. Naous,R. Raghuraman, and J. Luo, “Net FPGA-an open platform for gigabit-rate network switching and routing,” in IEEE international Conference on Microelectronic Systems Education, 2007. |
|
[5] | D. Boneh and M. Franklin, “Identity-based encryption from the weilpairing,” SIAM J. of Computing, 2003. |
|
[6] | J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-Policy Attribute-Based Encryption,” Proceedings of the 28th IEEE Symposium on Securityand Privacy (Oakland), 2007. |
|
[7] | D. Huang, X. Zhang, M. Kang, and J. Luo, “Mobicloud: A secure mobicloud framework for pervasive mobile computing and communication,” in Proceedings of 5th IEEE International Symposium on Service Oriented System Engineering, 2010. |
|
[8] | D. Huang and D. Medhi, “A Key-chain Based Keying Scheme for Many-to-Many Secure Group Communication,” ACM Transactions on Information and System Security, 2004. |
|
[9] | A. Shamir, “How to Share a Secret,” Communications of the ACM, 1979. |
|
[10] | J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-Policy Attribute Based Encryption,” Proceedings of the 28th IEEE Symposium on Securityand Privacy (Oakland), 2007. |
|
[11] | D. Boneh and M. Franklin, “Identity-based encryption from the weilpairing,” SIAM Journal of Computing, 2003. |
|
[12] | J.Bethencourt, A. Sahai, and B. Waters, “Ciphertext-Policy Attribute-Based Encryption,” Proceedings of the 28th IEEE Symposium on Securityand Privacy (Oakland), 2007. |
|
[13] | P. Barreto, B. Libert, N. McCullagh, and J. Quisquater, “Efficient and provably-secure identity-based signatures and signcryption from bilinear maps,” Advances in Cryptology-ASIACRYPT 2005. |
|