[1]
Byron Acohido, "New Security Flaws Detected in Mobile Devices", http://www.mobile-tech-today.com/story.xhtml?story_id=022001KSER0E&nl=8.
Google Scholar
[2]
Eric Lundquist, "Security in the Borderless Enterprise", http://www.informationweek.com/news/global-cio/interviews/232601452
Google Scholar
[3]
Stuart Sumner, "New Android malware can remotely control phone", http://www.computing.co.uk/ctg/news/2166409/android-malware-remotely-control-phone
Google Scholar
[4]
Gareth Morgan, "Mobile security incidents costing firms nearly $500,000 a year", http://www.v3.co.uk/v3-uk/news/2154670/mobile-security-incidents-costing-firms-nearly-usd500?wt.mc_ev=click, 2012.2.23.
Google Scholar
[5]
Molly Bernhart Walker, "NIST Security controls update addresses privacy, mobile, cloud", http://www.fiercegovernmentit.com/story/nist-security-controls-update-addresses-privacy-mobile-cloud/2012-02-29?utm_medium=nl&utm_source=internal, 2012.02.29.
Google Scholar
[6]
George V. Hulme, "Mobile security threats are heating up: criminals, security researchers, vendors and even investors are now taking mobile security more seriously", http://www.csoonline.com/article/691043/mobile-security-threats-are-heating-up?source=CSONLE_nlt_update_2011-10-06, 2011.10.05.
DOI: 10.1016/s1353-4858(11)70087-3
Google Scholar
[7]
Rivest, Adleman, Dertouzos, "On data bank and privacy homomorphisms", Proceedings of the 19th Annual Symposium on Foundations of Secure Computation-FSC, pp.169-180, 1978.
Google Scholar
[8]
J. Domingo-Ferrer, " A New privacy homomorphism and applications", Information Proceeding Letters, Vol. 60, No. 5, pp.277-282, 1996.
Google Scholar
[9]
Craig Gentry, "Fully Homomorphic encryption using ideal lattices", In proceedings of the 41st ACM Symposium on Theory of Computing – STOC, pp.169-178, 2009.
DOI: 10.1145/1536414.1536440
Google Scholar
[10]
Pascal Paillier, "Public-key cryptiosystems based on composite degree residuosity classes", Advanced in Cryptology-Eurocrypt(LNCS1592), pp.223-238, 1999.
DOI: 10.1007/3-540-48910-x_16
Google Scholar
[11]
Dan Boneh, Giovanni Di Crescenzo, "Public Key Encryption with keyword Search"
Google Scholar
[12]
Dawn Xiaodong Song, David Wagner, Adrian Perrig, "Practical Techniques for Searches on Encrypted Data"
Google Scholar
[13]
Yong Ho Hwang, Pil Joon Lee, "Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-user System", LNCS4575, pp.2-22, 2007.
DOI: 10.1007/978-3-540-73489-5_2
Google Scholar