5Khan S, Nauman M, Othman A T, et al. How secure is your smartphone: An analysis of smartphone security mechanisms[C]// Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2012 International Conference on. IEEE, 2012: 76-81.
7Apperian, Inc. Enterprise app store [EB/OL]. http://www.apperian.com/mobile- application-management/enterprise-app - store/, 2014.
8Apperian, Inc. Creating a secure mobile application governance strategy [EB/OL]. http://www.apperian.com/creating-secure-mobile-app- governance-strategy-federal-agencies/, 2014.
9Apperian, Inc. Mobile app security [EB/OL]. http://www.apperian. com/mobile-application-management/mobile-app-security/, 2014.
10Kaminsky A, Kurdziel M, Radziszowski S. An overview of cryptanalysis research for the advanced encryption standard[C]//MILITARY COMMUNICATIONS CONFERENCE, 2010-MILCOM 2010. IEEE, 2010: 1310-1316.