(In)Secure Android Debugging: Security analysis and lessons learned.
Krzysztof OpasiakWojciech MazurczykPublished in: Comput. Secur. (2019)
Keyphrases
- lessons learned
- security analysis
- security requirements
- smart card
- encryption scheme
- authentication protocol
- public key
- security model
- case study
- security properties
- mutual authentication
- key exchange
- high security
- mobile devices
- image encryption
- user authentication
- private key
- authentication scheme
- stream cipher
- encryption algorithm
- information systems
- elliptic curve cryptography
- secure electronic