1Rivest-R L, Shamir A, Adieman L M. Crypiographic communications system and method[J]. United States Pa- tent 4405829, 1983.
2Kelly S, Frankel S, Glenn R. The AES-CBC Cipher Algo- rithm and Its Use with IPsec[J]. 2003.
3Orebaugh A, Ramirez G, Beale J. Wireshark&Ethereal network proloco! analyzer toolkit[M]. Syngress, 2006.
4Schulz P. Code protection in android[J]. Insititute of Computer Science, Rheinische Frie- drich-Wilhelms-Universitgt Bonn, Germany, 2012.
5Nelson M R. THE ZLIB COMPRESSION LI- BRARY-Mark examines zlib, a library of C routines that can be used to compress or expand files using the same deflate algorithm popularized by PKZIP 2.0[J]. Dr Dobb's Journal-Software Tools for the Professional Program- mer, 1997, 22(1): 36-41.
6Leach P, Mealling M, Salz R. IETF RFC 4122. A Univer- sally Unique IDentifier (UUID) URN Namespace[J]. http://www.ietf.org/rfc/rfc4122.txt,2005.
7Josefsson'S. RFC 3548-the basel6, base32, and base64 data encodings[J]. Internet Request for Comments,2003.