Ephemeral classification of mobile terminals
暂无分享,去创建一个
[1] Anders Fongen,et al. The Integration of Trusted Platform Modules into a Tactical Identity Management System , 2013, MILCOM 2013 - 2013 IEEE Military Communications Conference.
[2] Tilo Müller,et al. FROST - Forensic Recovery of Scrambled Telephones , 2013, ACNS.
[3] Jos Wetzels. Hidden in snow, revealed in thaw: Cold boot attacks revisited , 2014, ArXiv.
[4] Federico Mancini,et al. Mobile Data Collection: A Security Perspective , 2015 .
[5] Marcos A. Simplício,et al. SecourHealth: A Delay-Tolerant Security Framework for Mobile Health Data Collection , 2015, IEEE Journal of Biomedical and Health Informatics.
[6] Ariel J. Feldman,et al. Lest we remember: cold-boot attacks on encryption keys , 2008, CACM.
[7] Joeri de Ruiter,et al. Analysis of Secure Key Storage Solutions on Android , 2014, SPSM@CCS.
[8] Michael Shaulov,et al. Practical Attacks against Mobile Device Management ( MDM ) Solutions , 2013 .
[9] Niels Provos,et al. Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..
[10] Philippe Bonnet,et al. Towards an Open Framework Leveraging a Trusted Execution Environment , 2013, CSS.
[11] Adrian Perrig,et al. Bootstrapping Trust in Modern Computers , 2011, Springer Briefs in Computer Science.
[12] Konrad Wrona,et al. Designing medium assurance XML-labelling guards for NATO , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.