Tracing Cryptographic Agility in Android and iOS Apps.
Kris HeidJens HeiderMatthias RitscherJan-Peter StotzPublished in: ICISSP (2023)
Keyphrases
- mobile apps
- mobile applications
- mobile devices
- coverage includes
- m learning
- smart card
- smart phones
- business models
- supply chain
- business process
- security protocols
- software systems
- key management
- android platform
- hash functions
- competitive advantage
- mobile phone
- digital signature
- mobile platforms
- development tools
- android application
- systems development
- context aware
- case study
- database administration
- security properties
- user experience
- encryption key
- e learning