Login / Signup
Security Analysis and Protection Based on Smali Injection for Android Applications.
Junfeng Xu
Shoupeng Li
Tao Zhang
Published in:
ICA3PP (1) (2014)
Keyphrases
</>
security analysis
smart card
security requirements
information security
public key
security model
high security
user authentication
image encryption
security properties
mutual authentication
encryption algorithm
authentication protocol
encryption scheme
authentication scheme
secret key
software engineering