1. Dafir Ech-Cherif El Kettani M, En-Nasry B (2011) MIdM: an open architecture for mobile identity management. J Converg 2(2):25–32
2. Luo H, Shyu ML (2011) Quality of service provision in mobile multimedia—a survey. Human-centric Comput Inf Sci 1:5
3. Chuan D, Lin Y, Linru M, Yua C (2011) Towards a practical and scalable trusted software dissemination system. J Converg 2(1):53–60
4. Halbronn C, Sigwald J (2010) iPhone security model & vulnerabilities. In: Proceedings of Hack in the box sec-conference. Kuala Lumpur, Malaysia
5. Burns J (2009) Exploratory android surgery. In: Proceedings of Black Hat, USA