1. Extending e-business applications using mobile technology;Atkins,2006
2. An expressive and provably secure ciphertext-policy attribute-based encryption;Balu;Inf. Sci.,2014
3. Deterministic and efficiently searchable encryption;Bellare,2007
4. Random oracles are practical: a paradigm for designing efficient protocols;Bellare,1993
5. Identity-based encryption from the weil pairing;Boneh,2001