Login / Signup
Signature Verification Based on Dex CRC and Blake2 Algorithm to Prevent Reverse Engineering Attack in Android Application.
Ilham
Muhammad Niswar
Ady Wahyudi Paundu
Published in:
Int. J. Interact. Mob. Technol. (2023)
Keyphrases
</>
reverse engineering
dynamic programming
key features
databases
similarity measure
object recognition
software engineering
classification method
path finding