[1] |
International Data Corporation (IDC). As Tablets Slow and PCs Face Ongoing Challenges, Smartphones Grab an Ever-Larger Share of the Smart Connected Device Market Through 2019[EB/OL]. .
|
[2] |
A. Whitten, J. D. Tygar.Why Johnny Can’t Encrypt: A Usability Evaluation of PGP 5.0[C]//Proceedings of the 8th USENIX Security Symposium, Washington, D.C., USA: 1999, 169-184.
|
[3] |
Simson L. Garfinkel, Robert C.Miller. Johnny 2: A User Test of Key Continuity Management with S/MIME and Outlook Express[C]// Symposium On Usable Privacy and Security (SOUPS), Pittsburgh, Penn. USA: 2005, 13-24.
|
[4] |
K. Renaud, M. Volkamer, A. Renkema-Padmos.Why Doesn’t Jane Protect Her Privacy?[C]//Privacy Enhancing Technologies. Springer International Publishing, 2014: 244-262.
|
[5] |
傅坦坦,马启航,陈雅婕,等. 移动终端数据泄露动态监控系统[J]. 信息网络安全,2014,(5):68-72.
|
[6] |
Sebastian Schrittwieser, Peter Fruhwirt, Peter Kieseberg, et al.Guess Who's Texting You? Evaluating the Security of Smartphone Messaging Applications[C]//Proceedings of the Network and Distributed System Security Symposium(NDSS’12), San Diego, California, USA: 2012.
|
[7] |
赵洋,胡龙,熊虎,等. 基于沙盒的Android恶意软件动态分析方案[J]. 信息网络安全,2014,(12):21-26.
|
[8] |
Nik Unger, Sergej Dechand, Joseph Bonneau, et al.SoK: Secure Messaging[C]//IEEE Security & Privacy (Oakland), San Jose, California, USA: 2015.
|
[9] |
黄可臻,李宇翔,林柏钢. 基于Android的隐私数据安全保护系统[J]. 信息网络安全,2014,(9):54-57.
|
[10] |
NFC World+. NFC phones: The definitive list[EB/OL]. .
|
[11] |
张晓,李林,许家乐,等. 基于SMC的Android软件保护研究与实现[J]. 信息网络安全,2014,(11):74-78.
|