Author:
Tai Yu,Hu Wei,Mu Dejun,Mao Baolei,Guo Lantian,Qin Maoyuan
Publisher
Springer International Publishing
Reference20 articles.
1. Extracting qualcomms keymaster keys - breaking android full disk encryption (2016). http://bits-please.blogspot.com/2016/06/extractingqualcomms-keymaster-keys.html
2. Lecture Notes in Computer Science;GT Becker,2013
3. Bell, D.E., LaPadula, L.J.: Secure computer systems: mathematical foundations. Technical report, DTIC Document (1973)
4. Dalton, M., Kannan, H., Kozyrakis. C.: Raksha: a flexible information flow architecture for software security. In: ACM SIGARCH Computer Architecture News, vol. 35, pp. 482–493. ACM (2007)
5. Denning, D.E.: A lattice model of secure information flow. Commun. ACM 19(5), 236–243 (1976)