Sign in
An empirical study of cryptographic misuse in android applications.
Manuel Egele
David Brumley
Yanick Fratantonio
Christopher Kruegel
Published in:
CCS (2013)
Keyphrases
</>
smart card
intrusion detection system
anomaly detection
countermeasures
security protocols
key management
multiscale
personal data
databases
machine learning
search engine
image sequences
similarity search
hash functions
random number generator
encryption key