[1] Amani N. Using SMS as a business communication tools for SMES[C]// The 6th Regional Innovation System and Innovation Clusters, 2009.
[2] Symantec. Whitepaper: Two-factor Authentication: A TCO Viewpoint[EB/OL]. https://www4.symantec.com/mktginfo/whitepaper/user_authentication/whitepaper-twofactor-authentication.pdf, 2015-12-15.
[3] Babu K S, Saleems A F. SMS encryption for mobile communication[J]. International Journal of Scientific Engineering and Technology Research, 2013,2(17):1965-1972.
[4] Mueller R, Schrittwieser S, Fruehwirt P, et al. Security and privacy of smartphone messaging applications[J]. International Journal of Pervasive Computing and Communications, 2015,11(2):132-150.
[5] Rayarikar R, Upadhyay S, Pimpale P. SMS encryption using AES algorithm on Android[J]. International Journal of Computer Applications, 2012,50(19):12-17.
[6] Agoyi M, Seral D. SMS security: An asymmetric encryption approach[C]// 2010 6th International Conference on Wireless and Mobile Communications (ICWMC). 2010:448-452.
[7] Qi Na, Pan Jing, Ding Quan. The implementation of FPGA-based RSA public-key algorithm and its application in mobile-phone SMS encryption system[C]// 2011 1st International Conference on Instrumentation, Measurement, Computer, Communication and Control. 2011:700703.
[8] Abdellatef B A, Ahmed A A, Mahfouz A, et al. Hybrid compression encryption technique for securing SMS[J]. International Journal of Computer Science and Security, 2010,3(6):473-481.
[9] Lin Chiachi, Li Hongyang, Zhou Xiaoyong, et al. Screenmilker: How to milk your Android screen for secrets[C]// The 21st Annual Network and Distributed System Security Symposium (NDSS). 2014.
[10]〖JP3〗Arzt S, Rasthofer S, Bodden E. Instrumenting Android and Java applications as easy as abc[C]// Runtime Verification(The 4th International Conference RV20B). 2013,8174:364-381.
[11]Alves T, Felton D. TrustZone: Integrated hardware and software security[J]. ARM White Paper, 2004,3(4):18-24.
[12]Shen Xiaoyu, Du Zhenjun, Chen Rong. Research on NTRU algorithm for mobile Java security[C]// International Conference on Scalable Computing and Communications/8th International Conference on Embedded Computing. 2009:366-369.
[13]Kaur E A, Singh E N. SMS encryption using NTRU algorithm[J]. International Journal of Advanced Research in Computer & Technology, 2015,3(2):96-100.
[14]TrustKernel Team.TrustKernel[EB/OL]. http://trustkernel.org/, 2015-12-14.
[15]Whyte W, Etzel M, Jenney P. Open source NTRU Public key Cryptography Algorithm and Reference Code[EB/OL]. https://github.com/NTRUOpenSourceProject/ntru-crypto, 2015-12-14.
[16]Aututu.Antutu Benchmark [EB/OL]. http://www.antutu.com/en/Ranking.shtml, 2015-12-14.
[17] Ubuntu Wiki.Booting the Android LXC Container[EB/OL]. https://wiki.ubuntu.com/Touch/ContainerArchitecture, 2015-12-14.
|