Article One
[1] Li Gangbiao. Research and implementation of database encryption technology [D]. Taiyuan University of Technology, 2010:18-78.
[2] Yang Yunjun. The design and implementation of Android [M]. Beijing: Mechanical industry Press, 2013:5-65.
[3] Qin Mingfu. Research on digital Image encryption based on chaos theory [D]. Chongqing University, 2009:34-48.
[4] Ke New Year's Day. Anatomy of the Android kernel [M]. Beijing: Electronic industry Press, 2011:67-98.
[5] Li Gang. Crazy Android Handout [M]. Beijing: Electronic industry Press, 2013:12-87.
[6] Wu Ming Air. Research on DES and RSA hybrid encryption algorithm [D]. Harbin Institute of Technology, 2013:13-56.
[7] The peak. Design and implementation of Linux memory management [D]. Shenyang University of Technology, 2007:45-89
[8] Chen is the most. Research and implementation of mobile terminal transparent encryption system based on Android platform [D]. Chongqing University of Technology, 2012:108-150.
[9] Shaoyun, Wang Yu, Duyu, Yue Silver. Research on hybrid encryption technology based on software security [J]. Computer Engineering, 2004,23 (33): 98-100.
[10] Cheng, object, Shi-state. A data encryption scheme based on DES and RSA algorithm [J]. Journal of Henan Institute of Education (Natural Science Edition), 2003,22 (3): 69-71.
[One] Xin chen,songwe i ma,bingli Guo,yan wang,juhao Li, Zhangyuan Chen,yongqi He. A novel Fragmentation-aware spectrum allocation algorithm in flexible bandwidth optical networks[j]. Optical Switching and networking,2014 (12): 6-22.
[12] The Li Zhongxin, Wang. Two kinds of image and video encryption schemes based on partial encryption [J]. Computer Engineering, 2004,4 (11): 11-34.
[Zhu], Zhiwu Liu, Xu Li, Xiangyu. Ratcheting behaviors of the Carbon fiberreinforced PEEK composites:experimenta l Study and numerical simulation[j]. Polymers & Polymer Composite, 2014, (221): 45-230.
Chapter Two
[1] Li Gang. Crazy Android Handout [M]. Beijing: Electronic industry Press, 2013:25-42.
[2] yang is rich. Android Technology Insider [M]. Beijing: Mechanical industry Press, 2011:77-89.
[3] Yang Yunjun. The design and implementation of Android [M]. Beijing: Mechanical industry Press, 2013:45-49.
[4] Ke New Year's Day. Anatomy of the Android kernel [M]. Beijing: Electronic industry Press, 2011:59-70.
[5] Fengsengjiang. Android software security and reverse analysis [M]. Beijing: People's post and telecommunications press, 2013:78-90.
[6] Yu Chengfeng, Li Daiping, Mao Yonghua. ANDROID3.0 memory management mechanism analysis [M]. Computer application and software, 2013:55-80.
[7] with ice ice. Design and implementation of Launcher Launcher under Android platform [D]. Harbin Institute of Technology, 2012:108-150.
[8] Dugizhi, Xu Mingkun. Research and optimization of memory management in Android system [J]. Software, 2012,24 (5): 69-80.
[9] Ma Yue. Android Architecture and applications [D]. Beijing: China University of Geosciences, 2008:330-357.
[10] Yao, Liu Weiguo. Architecture and application development of Android [J]. Computer system applications, 2008,77 (11): 99-111.
[11] Gooweel. Design and implementation of software Automation test scheme for Android operating system [D]. Beijing: China posts and telecommunications, 2012:440-479.
[12] Sun Jian. Design and implementation of application-on-demand loading mechanisms on Android systems [M]. Peking University, 2011:99-110.
[13] Luna. Design and implementation of mobile desktop information system based on Android platform [M]. Xidian University, 2011:290-300.
[14] Gao. Google Android Application Framework principles and programming 36 meters [M]. Misoo,2010:8-13.
[15] Shong, Wang Mingwen. Software design Patterns and their use [J]. Computer Applications, 2002,22 (8): 32-33.
The reference document of the bi-establishment