1TCG mobile trusted module speeifieation: Version 1.0, Revision 7.02 [ S ]. Beaverton, OR, USA: Trusted Computing Group, 2010.
2ALVES T, FELTON D. TrustZone.- integrated hardware and software security [J].Information Quarterly, 2004, 3 (4) : 18-24.
3AZEMA J, FAYAD G. M-shield mobile security technology: making wireless secure [R]. Dallas, TX, USA: Texas Instrument, 2008.
4DIETRICH K, WINTER J. Towards customizable, application specific mobile trusted modules[C]// Proceedings of the 5th Workshop on Scalable Trusted Computing, October 4, 2010, Chicago, IL, USA: 31-40.
5DWIVEDI H, CLARK C, THIEL D. Mobile application security[M]. New York, NY, USA: McGraw Hill, 2010.
6BUGIEI. S, EKBERG J E. Implementing an application-specific credential platform using late-launched mobile trusted module[C]// Proceedings of the 5th Workshop on Scalable Trusted Computing, October 4, 2010, Chicago, IL, USA: 21-30.
7NAUMAN M, KHAN S, ZHANG X, et al. Beyond kernel- level integrity measurement: enabling remote attestation for the android platform [ C]// Proceedings of the 3rd International Conference on Trust and Trustworthy Computing, June 21-23, 2010, Berlin, Germany: 17p.
8SELLHORST M, STUBLE C, FELDMANN F, et al. Towards a trusted mobile desktop [ C ]// Proceedings of the 3rd International Conference on Trust and Trustworthy Computing, June 21-23, 2010, Berlin, Germany: 7p.