G. Bai, L. Gu, T. Feng, Y. Guo, and X. Chen, Contextaware usage control for android, Security and Privacy in Communication Networks, pp.326-343, 2010.
DOI : 10.1007/978-3-642-16161-2_19

E. B. Barker, D. Johnson, and M. E. Smid, NIST SP 800-56A. Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography, 2013.

A. Belenko and D. Sklyarov, secure password managers " and " militarygrade encryption " on smartphones: Oh, really?, 2012.

E. Chin, A. P. Felt, K. Greenwood, and D. Wagner, Analyzing inter-application communication in Android, Proceedings of the 9th international conference on Mobile systems, applications, and services, MobiSys '11, pp.239-252, 2011.
DOI : 10.1145/1999995.2000018

W. Enck, P. Gilbert, L. P. Byung-gon-chun, J. Cox, P. Jung et al., TaintDroid, Proceedings of the 9th USENIX conference on Operating systems design and implementation, OSDI'10, pp.1-6, 2010.
DOI : 10.1145/2619091

S. Fahl, M. Harbach, M. Oltrogge, T. Muders, and M. Smith, Hey, You, Get Off of My Clipboard, Proceedings of the 17th International Conference on Financial Cryptography and Data Security, 2013.
DOI : 10.1007/978-3-642-39884-1_12

D. Feth and C. Jung, Context-Aware, Data-Driven Policy Enforcement for Smart Mobile Devices in Business Environments, Security and Privacy in Mobile Information and Communication Systems, pp.69-80, 2012.
DOI : 10.1007/978-3-642-21599-5_7

J. Michael, K. May, and . Bhargavan, Towards unified authorization for android, Engineering Secure Software and Systems, pp.42-57, 2013.

M. Ongtang, S. Mclaughlin, W. Enck, and P. Mcdaniel, Semantically Rich Application-Centric Security in Android, 2009 Annual Computer Security Applications Conference, pp.658-673, 2012.
DOI : 10.1109/ACSAC.2009.39

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.164.9444

O. Riva, C. Qin, K. Strauss, and D. Lymberopoulos, Progressive authentication: deciding when to authenticate on mobile phones, Proceedings of the 21st USENIX conference on Security symposium, Security'12, pp.15-15

P. Teufl, T. Zefferer, and C. Stromberger, Mobile Device Encryption Systems, Proceedings of the 28th IFIP TC-11 SEC 2013 International Information Security and Privacy Conference, p.15, 2013.
DOI : 10.4236/jis.2010.12009

URL : https://hal.archives-ouvertes.fr/hal-01463828

M. Tiwari, P. Mohan, A. Osheroff, H. Alkaff, E. Shi et al., Context-centric security, Proceedings of the 7th USENIX conference on Hot Topics in Security, HotSec'12, pp.9-9

X. Wei, L. Gomez, I. Neamtiu, and M. Faloutsos, Malicious Android Applications in the Enterprise: What Do They Do and How Do We Fix It?, 2012 IEEE 28th International Conference on Data Engineering Workshops, pp.251-254, 2012.
DOI : 10.1109/ICDEW.2012.81