P. Saranya.,M.LVaralakshmi “H.264 based Selective Video Encryption for Mobile Application,” International Journal of Computer Applications, vol. 17, pp. 21-25, 2011.
 A.Saad Najim, H.Eman, “A Speech Encryption based on Chaotic Maps,” International Journal of Computer Applications, vol. 93, pp. 19-28, 2014.
 M.Danang Tri, Dr. Ir. Rinaldi Munir, M.T., “Secured Video Streaming Development On Smartphones With Android Platform, ” In Proceedings of the IEEE International Conference on Telecommunication Systems, Services, and Applications (TSSA), pp. 340-344, 2012.
 S.Laiphrakpam Dolendro, S. Khumanthem Manglem, “Implementation of Text Encryption using Elliptic Curve Cryptography, ” In Proceedings of the Elsevier International Multi-Conference on Information Processing(IMCIP), pp.73-82, 2015.
 H.Darrel ,M.Alfred and V.Scott , Guide to Elliptic Curve Cryptography, Springer, 2004.
 Y. Salem, "Implementation of Elliptic Curve Cryptography using biometric features to enhance security services," Msc, University Malaya, 2009.
 K. Rahouma, “A Modified Menezes-Vanstone Elliptic Curve Multi-Keys Cryptosystem,” semanticscholar.org 2006. [Online].Available: https://pdfs.semanticscholar.org/d13c/05f9256790d9af7637009168b3018fdaf06b.pdf.
 D. Sravana Kumar, CH. Suneetha A., ChandrasekhAR, “Encryption of Data Using Elliptic Curve Over Finite Fields,” International Journal of Distributed and Parallel Systems ,vol.3,pp.301-309, 2012.
 S. Rahul, C. Ritu, G.Vinit Kumar , and S.Pooja, “Implementation of Elliptic Curve Cryptography for Audio Based Application,” International Journal of Engineering Research & Technology , vol. 3, pp. 2210-2214, 2014.
 N.Mayur, S.Avinash, B.Pratik,and M. Chetan, “ Secure and Reliable Data Transfer on Android Mobiles Using AES and ECC Algorithm, ” International Journal of Innovative Technology & Adaptive Management (IJITAM) www.ijitam.org 2014[Online].Available:http://www.ijitam.org/doc/v11c4.pdf.
 M. Dhananjay, J. Nitin , “ Video Encryption Using AES Algorithm,” In Proceedings of the IEEE International Conference on Current Trends in Engineering and Technology (ICCTET), pp.332-337, 2014.
 F. Hadi, “A Modified AES for Mobile Devices,” MSc thesis in Computer Sciences University of Technology, 2015.
 A. Kareem, “An Efficient Block Encryption Cipher Based on Chaotic Maps for SecureVideo Applications, ” MSc thesis in Computer Sciences , Al-Mustansiriyah University, 2015.
 R. Samih, “MPEG-4 Encryption based on RC6 and RC4,” MSc thesis in Computer Sciences , Al-Mustansiriyah University, 2015.
 K.Mankiran, M.Manish, “Enhancing Security in Mobile cloud computing using double-encryption model, ” International Journal of Modern Computer Science , vol. 4, pp. 69-73 , 2016.
 H. Zimeng, “Security of Mobile Devices and Wi-Fi Networks,” Bachelor’s Thesis MAMK Unviversity of applied sciences , 2015.
 The Statistics Portal https://www.statista.com/statistics/266211/distribution-of-free-and-paid-android-apps/ (2017).
 A.MohdShahdi, M.NurEmyra, N.Rathidevi, H.Rosilah and H.Nor Effendy, “ Comparison Between Android and iOS Operating System in terms of Security,” In Proceedings of the IEEE International Conference on Information Technology in Asia (CITA), 2013.
 A.Jeremy,H. Alexander Van’t,and A.Naser, “Cider: Native Execution of iOS Apps on Android, ” in Proceedings of the International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS),pp.367-381 UT, USA, 2014.
 I. Jabbar, “Secure E-Voting System Using Homonrphic Encryption, ” Msc , University of Mustansiryriah, 2016.
 C. Paar , J. Pelzl , Understanding Cryptography A Textbook for Students and Practitioners, Springer, 2010.
 E.D.Ziad,Y.N Shahrul , and R B O Rozmie r“ A New Modification for Menezes-Vanstone Elliptic Curve Cryptosystem, ” Journal of Theoretical and Applied Information Technology, vol. 85, pp. 290-297,2016.
 K. Rabah, “Theory and implementation of elliptic curve cryptography,” Journal of Applied Sciences, pp. 604-633, 2005.