1. Ravi S, Raghunathan A, Chakradhar S. Tamper resistance mechanisms for secure, embedded systems. In: 17th international conference on VLSI design; Mumbai India. 2004, January.
2. Kommerling O, Kuhn MG. Design principles for tamper-resistant smartcard processors. In: Proceedings USENIX Wkshp. on Smartcard Technology (Smartcard ‘99); Chicago, IL, USA. 1999 May. p. 9–20.
3. Rankl W, Effing W. “Smart Card Handbook”. John Wiley and Sons; 2010.
4. Zhao S, Lee PPC, Lui JCS, et al. Cloud-based push-styled mobile botnets: a case study of exploiting the cloud to device messaging service. In: ACSAC ‘12 Proceedings of the 28th Annual Computer Security Applications Conference; Orlando, Florida, USA. 2012. p. 119–128.
5. Ornaghi A, Valleri M. Man in the middle attacks. In: Blackhat Conference Europe; 2003. Available from: https://www.blackhat.com/presentations/bh-europe-03/bh-europe-03-valleri.pdf