1. A brief review of mobile cloud computing opportunities.;M.Alizadeh;Research Notes in Information Science,2013
2. Brunette, G., & Mogull, R. (2009). Security guidance for critical areas of focus in cloud computing. Cloud Security Alliance, 1-76.
3. Chen, Y.-J., & Wang, L.-C. (2011). A security framework of group location-based mobile applications in cloud computing. Paper presented at the 40th International Conference on Parallel Processing Workshops (ICPPW). Taipei, Taiwan.
4. Chow, R., Jakobsson, M., Masuoka, R., Molina, J., Niu, Y., Shi, E., & Song, Z. (2010). Authentication in the clouds: A framework and its application to mobile users. Paper presented at the 2010 ACM Workshop on Cloud Computing Security Workshop. Chicago, IL.
5. Dinh, H. T., Lee, C., Niyato, D., & Wang, P. (2011). A survey of mobile cloud computing: architecture, applications, and approaches. Wireless Communications and Mobile Computing. London: Wiley. Retrieved from http://www.eecis.udel.edu/~cshen/859/papers/survey_MCC.pdf