메뉴 건너뛰기




Volumn , Issue , 2012, Pages 45-46

Analysis of android applications' permissions

Author keywords

[No Author keywords available]

Indexed keywords

BYTECODES; MOBILE SOFTWARES; SECURITY REQUIREMENTS;

EID: 84866899589     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SERE-C.2012.44     Document Type: Conference Paper
Times cited : (44)

References (7)
  • 6
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • M. Schroeder and J. Saltzer. The protection of information in computer systems. Proceedings of the IEEE, 63(9), pages 1278-1308, 1975.
    • (1975) Proceedings of the IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Schroeder, M.1    Saltzer, J.2
  • 7
    • 1242297829 scopus 로고    scopus 로고
    • Advanced obfuscation techniques for java bytecode
    • Chan, J.T. and Yang, W., Advanced obfuscation techniques for Java bytecode, Journal of Systems and Software 71, No. 2. pages 1-11, 2004.
    • (2004) Journal of Systems and Software , vol.71 , Issue.2 , pp. 1-11
    • Chan, J.T.1    Yang, W.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.