M. K. Aguilera, R. E. Strom, D. C. Sturman, M. Astley, and T. D. Chandra, Matching events in a content-based subscription system, Proceedings of the eighteenth annual ACM symposium on Principles of distributed computing , PODC '99, 1999.
DOI : 10.1145/301308.301326

H. Ballani, Y. Chawathe, S. Ratnasamy, T. Roscoe, and S. Shenker, Off by default, Proc. 4th ACM Workshop on Hot Topics in Networks (Hotnets-IV). Citeseer, 2005.

D. Boneh, G. Di-crescenzo, R. Ostrovsky, and G. Persiano, Public key encryption with keyword search. Lecture notes in computer science, pp.506-522, 2004.
DOI : 10.1007/978-3-540-24676-3_30

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.127.1462

R. Cáceres, L. Cox, H. Lim, A. Shakimov, and A. Varshavsky, Virtual individual servers as privacy-preserving proxies for mobile devices, Proceedings of the 1st ACM workshop on Networking, systems, and applications for mobile handhelds, MobiHeld '09, pp.37-42, 2009.
DOI : 10.1145/1592606.1592616

P. T. Eugster, P. A. Felber, R. Guerraoui, and A. Kermarrec, The many faces of publish/subscribe, ACM Computing Surveys, vol.35, issue.2, pp.114-131, 2003.
DOI : 10.1145/857076.857078

D. Li and M. Anand, MaJaB, Proceedings of the 7th international conference on Mobile systems, applications, and services, Mobisys '09, pp.95-108, 2009.
DOI : 10.1145/1555816.1555827

A. Pietiläinen, E. Oliver, J. Lebrun, G. Varghese, and C. Diot, MobiClique, Proceedings of the 2nd ACM workshop on Online social networks, WOSN '09, pp.49-54, 2009.
DOI : 10.1145/1592665.1592678

A. Qureshi and J. V. Guttag, Horde, Proceedings of the 3rd international conference on Mobile systems, applications, and services , MobiSys '05, pp.121-134, 2005.
DOI : 10.1145/1067170.1067184

V. Ramasubramanian, T. L. Rodeheffer, D. B. Terry, M. Walraed-sullivan, T. Wobber et al., Cimbiosys: a platform for content-based partial replication, NSDI'09: Proceedings of the 6th USENIX symposium on Networked systems design and implementation, pp.261-276, 2009.

N. Sadeh, J. Hong, L. Cranor, I. Fette, P. Kelley et al., Understanding and capturing peoples privacy policies in a mobile social networking application. Personal and Ubiquitous Computing, pp.401-412, 2009.
DOI : 10.1007/s00779-008-0214-3

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.299.8994

E. Shih, P. Bahl, and M. Sinclair, Wake on wireless:, Proceedings of the 8th annual international conference on Mobile computing and networking , MobiCom '02, pp.160-171, 2002.
DOI : 10.1145/570645.570666

D. Song, D. Wagner, and A. Perrig, Practical techniques for searches on encrypted data, IEEE Symposium on Security and Privacy, 2000.

J. Sorber, N. Banerjee, M. Corner, and S. Rollins, Turducken, Proceedings of the 3rd international conference on Mobile systems, applications, and services , MobiSys '05, 2005.
DOI : 10.1145/1067170.1067198

J. Su, J. Scott, P. Hui, J. Crowcroft, E. De-lara et al., Haggle: Seamless Networking for Mobile Applications, Lecture Notes in Computer Science, 2007.
DOI : 10.1007/978-3-540-74853-3_23

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.100.4775

H. Zhang, B. Decleene, J. Kurose, and D. Towsley, Bootstrapping deny-by-default access control for mobile ad-hoc networks, MILCOM 2008, 2008 IEEE Military Communications Conference, 2008.
DOI : 10.1109/MILCOM.2008.4753174