Sign in

Understanding the Origins of Weak Cryptographic Algorithms Used for Signing Android Apps.

Kanae YoshidaHironori ImaiNana SerizawaTatsuya MoriAkira Kanaoka
Published in: COMPSAC (2) (2018)
Keyphrases
  • cryptographic algorithms
  • mobile applications
  • mobile platforms
  • mobile apps
  • security protocols
  • android platform
  • android application
  • data encryption standard
  • elliptic curve cryptography
  • security mechanisms