Login / Signup

Sensitive Data in Smartphone Applications: Where Does It Go? Can It Be Intercepted?

Eirini AnthiGeorge Theodorakopoulos
Published in: ATCS/SePrIoT@SecureComm (2017)
Keyphrases