[1] | Wang Xin, Chen Delin, Sun Yue, Wang Xu, Yao Suying, “Security control for TVOS”, 2014 2nd Asian Pacific Conference on Mechatronics and Control Engineering. |
|
[2] | Wang Xin, Yao Suying, Wang Xu, Chen Delin, Sun Jun, Hua Zhong, Wang Dongfei, “TVOS Content Security Analysis and Protection in Smart TV”, 2014 2nd International Conference on Mechatronics and Control Engineering. |
|
[3] | Wang Xin, Chen Delin, Sun Yue, Wang Xu, Yao Suying, “The Security Model of Broadcast Illtelligent Terminal Application and Technology Realization on TVOS”, 2014 2nd International Conference on Mechatronics and Control Engineering. |
|
[4] | Felix Rohrer, Nebiyu Feleke, Yuting Zhang, Kenneth Nimley,Lou Chitkushev, Tanya Zlateva1. Android Security Analysis and Protectionin Finance and Healthcare. //Boston University MET |
|
[5] | ChenDelin, Li Zheng, Wang Ying, Zhao Liangfu, Zhang Dingjing. “The main technical characteristics and software architecture of NGB TVOS”, “Radio and television information”, 2013-10National Academy of Broadcasting Science |
|
[6] | NGB TVOS1.0 Version of cooperation and development. The next generation of radio and television (NGB) Intelligent Technology TV operating system v1.0.0, the State Press and Publication Administration |
|
[7] | GY/T267-2012.NGB Technical specification of terminal middleware, the State Press and Publication Administration |
|
[8] | Wang Mingmin, Zhu Yunbin. “To explore the implementation model and techniques of intelligent television terminal security under NGB environment”, “Radio and TV Technology”, 2012-10. |
|
[9] | Ning Hua, Li Wei, Wang Kun, Lei Mingyu. “Research on intelligent terminal security system”, “Modern telecommunication technology”, 2012-5. |
|
[10] | Haohui Mai, Edgar Pek, Hui Xue, Samuel T. King, P.Madhusudan. Verifying Security Invariants in ExpressOS // University of Illinois at Urbana-Champaign |
|
[11] | Bernhard J. Berger, Michaela Bunke, and Karsten Sohr. An Android Security Case Study with Bauhaus // 2011 18th Working Conference on Reverse Engineering. |
|
[12] | Zhiguo Wan, Jun’e Liu, Rui Zhang, and Robert H. Deng. “A Collusion-Resistant Conditional Access System for Flexible-Pay-Per-Channel Pay-TV Broadcasting” // IEEE TRANSACTIONS ON MULTIMEDIA VOL. 15,NO. 6, OCTOBER 2013 |
|
[13] | Eun-Jun Yoon, Kee-Young Yoo. “ECC-based Key Exchange Protocol for IPTV Service” // ICIC 2011 |
|
[14] | Stephen D. WolthusenFraunhofer-IGD. “Security Policy Enforcement at the File System Level in the Windows NT Operating System Family”. |
|
[15] | Hung-Min Sun, Mu-En Wu, Wei-Chi Ting, and M. Jason Hinek. “Dual RSA and Its Security Analysis” //IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 8, AUGUST 2007. |
|