A. Belenko and D. Sklyarov, Evolution of iOS Data Protection and iPhone Forensics : from iPhone OS to iOS, p.5, 2011.

Y. C. Chen and W. S. Ku, Self-Encryption Scheme for Data Security in Mobile Devices, 2009 6th IEEE Consumer Communications and Networking Conference, 2009.
DOI : 10.1109/CCNC.2009.4784733

M. H. Goadrich and M. P. Rogers, Smart smartphone development, Proceedings of the 42nd ACM technical symposium on Computer science education, SIGCSE '11, pp.607-612, 2011.
DOI : 10.1145/1953163.1953330

B. Kaliski, PKCS #5: Password-Based Cryptography Specification Version 2, 2000.
DOI : 10.17487/rfc2898

P. Pacatilu, Android Applications Security, Informatica Economica, vol.15, issue.3, pp.163-171, 2011.

V. R. Pandya, iPhone Security Analysis, Journal of Information Security, vol.01, issue.02, pp.74-87, 2008.
DOI : 10.4236/jis.2010.12009

URL : http://doi.org/10.4236/jis.2010.12009

M. Paul, N. S. Chauhan, and A. Saxena, A security analysis of smartphone data flow and feasible solutions for lawful interception, 2011 7th International Conference on Information Assurance and Security (IAS), 2011.
DOI : 10.1109/ISIAS.2011.6122788

L. S. Shurui, L. J. Jie, Z. R. Ru, and W. C. Cong, A Modified AES Algorithm for the Platform of Smartphone, 2010 International Conference on Computational Aspects of Social Networks, 2010.
DOI : 10.1109/CASoN.2010.172

D. A. Zovi, Apple iOS 4 Security Evaluation, 2011.