Login / Signup

Signature Verification Based on Dex CRC and Blake2 Algorithm to Prevent Reverse Engineering Attack in Android Application.

IlhamMuhammad NiswarAdy Wahyudi Paundu
Published in: Int. J. Interact. Mob. Technol. (2023)
Keyphrases
  • reverse engineering
  • dynamic programming
  • key features
  • databases
  • similarity measure
  • object recognition
  • software engineering
  • classification method
  • path finding