1. Lecture Notes in Computer Science;JH An,2001
2. Android: Keystore implementation. https://android.googlesource.com/platform/system/security/+/master/keystore/keystore.cpp
3. Artenstein, N., Revivo, I.: Man in the Binder: He who controls IPC, controls the droid (2014). www.blackhat.com/docs/eu-14/materials/eu-14-Artenstein-Man-In-The-Binder-He-Who-Controls-IPC-Controls-The-Droid-wp.pdf
4. Bellare, M., Desai, A., Jokipii, E., Rogaway, P.: A concrete security treatment of symmetric encryption. In: Proceedings of the 38th Annual Symposium on Foundations of Computer Science, FOCS 1997, pp. 394–405. IEEE (1997)
5. Lecture Notes in Computer Science;M Bellare,2000