参考文章(20)
Zhaohui Wang, Ryan Johnson, Rahul Murmuria, Angelos Stavrou, Exposing Security Risks for Commercial Mobile Devices Lecture Notes in Computer Science. pp. 3- 21 ,(2012) , 10.1007/978-3-642-33704-8_2
Sven Türpe, Andreas Poller, Jan Steffan, Jan-Peter Stotz, Jan Trukenmüller, Attacking the BitLocker Boot Process trust and trustworthy computing. pp. 183- 196 ,(2009) , 10.1007/978-3-642-00587-9_12
Ram Swaminathan, Erik Riedel, Mahesh Kallahalla, A framework for evaluating storage system security file and storage technologies. pp. 15- 30 ,(2002)
Mohammad Ahmed Alomari, Khairulmizam Samsudin, Abdul Rahman Ramli, None, Implementation of a parallel XTS encryption mode of operation Indian journal of science and technology. ,vol. 7, pp. 1813- 1819 ,(2014) , 10.17485/IJST/2014/V7I11/41468
Shakil Ahmed, Khairulmizam Samsudin, Abdul Rahman Ramli, Fakhrul Zaman Rokhani, Advanced Encryption Standard-XTS implementation in field programmable gate array hardware Security and Communication Networks. ,vol. 8, pp. 516- 522 ,(2015) , 10.1002/SEC.999
Hyojun Kim, Nitin Agrawal, Cristian Ungureanu, Examining storage performance on mobile devices Proceedings of the 3rd ACM SOSP Workshop on Networking, Systems, and Applications on Mobile Handhelds - MobiHeld '11. pp. 6- ,(2011) , 10.1145/2043106.2043112
Hahnsang Kim, Joshua Smith, Kang G. Shin, Detecting energy-greedy anomalies and mobile malware variants Proceeding of the 6th international conference on Mobile systems, applications, and services - MobiSys '08. pp. 239- 252 ,(2008) , 10.1145/1378600.1378627
Jaeheung Lee, Junyoung Heo, Yookun Cho, Jiman Hong, Sung Y Shin, None, Secure deletion for NAND flash file system Proceedings of the 2008 ACM symposium on Applied computing - SAC '08. pp. 1710- 1714 ,(2008) , 10.1145/1363686.1364093
Zhaohui Wang, Rahul Murmuria, Angelos Stavrou, Implementing and Optimizing an Encryption Filesystem on Android mobile data management. pp. 52- 62 ,(2012) , 10.1109/MDM.2012.31
Ruben Jonathan, Garcia Vargas, Eleazar Aguirre Anaya, RG Huerta, A Felix, Security controls for Android computational aspects of social networks. pp. 212- 216 ,(2012) , 10.1109/CASON.2012.6412404