Sign in
Understanding the Origins of Weak Cryptographic Algorithms Used for Signing Android Apps.
Kanae Yoshida
Hironori Imai
Nana Serizawa
Tatsuya Mori
Akira Kanaoka
Published in:
J. Inf. Process. (2019)
Keyphrases
</>
cryptographic algorithms
mobile applications
mobile apps
mobile platforms
security protocols
android platform
elliptic curve cryptography
mobile devices
data encryption standard
security mechanisms
android application