Login / Signup

Reputation Based Security Model for Android Applications.

Welderufael Berhane TesfayTodd BoothKarl Andersson
Published in: TrustCom (2012)
Keyphrases
  • security model
  • public key
  • access control
  • security analysis
  • security requirements
  • provably secure
  • designated verifier
  • real time
  • public key cryptography