1. Zhang, X., Schiffman, J., Gibbs, S., Kunjithapatham, A., & Jeong, S. (2009, November). Securing elastic applications on mobile devices for cloud computing. In Proceedings of ACM Workshop on Cloud Computing Security, CCSW ’09, Chicago, IL, USA.
2. Mollah, M. B., Azad, M. A. K., & Vasilakos, A. (2017). Security and privacy challenges in mobile cloud computing: Survey and way ahead. Journal of Network and Computer Applications, pp. 38–54.
3. Song, N., & Sun, Y. (2014). The cloud storage ciphertext retrieval scheme based on ORAM. China Communications, 11(14), 156–165. (IEEE Journals & Magazines).
4. Garg, P., & Sharma, V. (2014). An efficient and secure data storage in mobile cloud computing through RSA and Hash function. In 2014 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT). New York: IEEE Society.
5. Qin, Z., Weng, J., Cui, Y., & Ren, K. (2018). Privacy-preserving image processing in the cloud. IEEE Cloud Computing, 99 (IEEE Early Access Articles).