참고문헌
- Mobey Forum Mobile Financial Services, " Alternatives for Banks to offer Secure Mobile Payments version 1.0," Aug. 2010.
- TCG mobile reference architecture specification version 1.0,(https://www.trustedcomputinggroup.org)
- Siani Pearson, "Trusted Computing Platforms", 2003.
- TCG, "TCG Mobile Trusted Module Specification. Version 1.0, Revision 7.02, April 28, 2010.
- Bickford J., O'Hare R, Baliga A, Ganapathy V, and Iftode L, "Rootkits on Smart Phones: Attacks, Implications and Opportunities," Workshop on Mobile Computing Sys. and Appl. (HotMobile'10). ACM, Feb. 2010.
- Global Platform Device Technology, "The Trusted Execution Environment: Delivering Enhanced Security at a Lower Cost to the Mobile Market," Global Platform White Paper, Feb. 2011.
- Y.H. Kim, Y.G. Lee, and J.N. Kim, "TeeMo: A Generic Trusted Execution Framework for Mobile Devices," Proc. of International Conference on Computer, Networks, Systems, and Industrial Applications (CNSI), pp. 579-583, Jul. 2012.
- Y.H. Kim, J.N. Kim, "Building Secure Execution Environment for Mobile Platform," Proc. of First ACIS/JNU International Conference on Computers, Networks, Systems, and Industrial Engineering, pp. 119-122, 2011
- H.I. Joo, S.G. Choi, and S.I. Jeon, "Secure Booting using TPM on Mobile Platform", NCS2006, Dec. 2006.
- M.S. Kim, J.A. Shin, Y.S. Park, and S.I. Jeon, "Common Security Core Module for Mobile Platform," KIISC, vol.16, no 3, Jun. 2006..
- H. Chai, Z. Lu, Q. Meng, J. Wang, X. Zhang, Z. Zhang, "TEEI-A Mobile Security Infrastructure for TEE Integration, " Proc. of IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 914-920, 2014.
- M. Kim, H. Ju, Y. Kim, J. Park, Y. Park, "Design and implementation of mobile trusted module for trusted mobile computing," IEEE Transactions on Consumer Electronics, Vol. 56, No. 8, pp. 134-140, 2010. https://doi.org/10.1109/TCE.2010.5439136
- K.H. Baek, " Trend of Research and Technology for SEE," Electronics and Telecommunications Trends, Vol 22, No 5, 2007.10.
- D. Oh, I. Kim, K. Kim, S. Lee, and W. Ro, "Highly Secure Mobile Devices Assisted with Trusted Cloud Computing Environments" ETRI Journal, vol. 37, no. 2, pp. 348-358, Apr. 2015. https://doi.org/10.4218/etrij.15.0114.0397
- M. L. Polla, F. Martinelli, and D. Sgandurra, "A Survey on Security for Mobile Devices," IEEE Communications surveys & tutorials, vol. 15, no. 1, pp. 446-471, Mar. 2013. https://doi.org/10.1109/SURV.2012.013012.00028
- W. Arthur and D. Challener, A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security, Apress, 2015.