| [1] | M. Walshy, “Gartner: Mobile to outpace desktop web by 2013,” Online Media Daily, January 2010. |
| |
| [2] | D. Huang, X. Zhang, M. Kang, and J. Luo, “Mobicloud: A secure mobile cloud framework for pervasive mobile computing and communication,” in Proceedings of 5th IEEE International Symposium on ServiceOriented System Engineering, 2010. |
| |
| [3] | X. Zhang, J. Schiffman, S. Gibbs, A. Kunjithapatham, and S. Jeong, “Securing elastic applications on mobile devices for cloud computing,” in Proceedings of the ACM workshop on Cloud computing security, 2009. |
| |
| [4] | J. Lockwood, N. McKeown, G. Watson, G. Gibb, P. Hartke, J. Naous,R. Raghuraman, and J. Luo, “Net FPGA-an open platform for gigabit-rate network switching and routing,” in IEEE international Conference on Microelectronic Systems Education, 2007. |
| |
| [5] | D. Boneh and M. Franklin, “Identity-based encryption from the weilpairing,” SIAM J. of Computing, 2003. |
| |
| [6] | J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-Policy Attribute-Based Encryption,” Proceedings of the 28th IEEE Symposium on Securityand Privacy (Oakland), 2007. |
| |
| [7] | D. Huang, X. Zhang, M. Kang, and J. Luo, “Mobicloud: A secure mobicloud framework for pervasive mobile computing and communication,” in Proceedings of 5th IEEE International Symposium on Service Oriented System Engineering, 2010. |
| |
| [8] | D. Huang and D. Medhi, “A Key-chain Based Keying Scheme for Many-to-Many Secure Group Communication,” ACM Transactions on Information and System Security, 2004. |
| |
| [9] | A. Shamir, “How to Share a Secret,” Communications of the ACM, 1979. |
| |
| [10] | J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-Policy Attribute Based Encryption,” Proceedings of the 28th IEEE Symposium on Securityand Privacy (Oakland), 2007. |
| |
| [11] | D. Boneh and M. Franklin, “Identity-based encryption from the weilpairing,” SIAM Journal of Computing, 2003. |
| |
| [12] | J.Bethencourt, A. Sahai, and B. Waters, “Ciphertext-Policy Attribute-Based Encryption,” Proceedings of the 28th IEEE Symposium on Securityand Privacy (Oakland), 2007. |
| |
| [13] | P. Barreto, B. Libert, N. McCullagh, and J. Quisquater, “Efficient and provably-secure identity-based signatures and signcryption from bilinear maps,” Advances in Cryptology-ASIACRYPT 2005. |
| |