Author of the publication

Anti-debugging scheme for protecting mobile apps on android platform.

, , , and . J. Supercomput., 72 (1): 232-246 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Anti-reversible dynamic tamper detection scheme using distributed image steganography for IoT applications., , , , and . J. Supercomput., 74 (9): 4261-4280 (2018)Mobile Code Anti-Reversing Scheme Based on Bytecode Trapping in ART., , , and . Sensors, 19 (11): 2625 (2019)Wideband open stub BPF for cognitive radio system applications., , and . Int. J. Sens. Networks, 25 (3): 198-205 (2017)Noninteractive self-certification for long-lived mobile ad hoc networks., and . IEEE Trans. Inf. Forensics Secur., 4 (4): 946-955 (2009)Hardware-assisted credential management scheme for preventing private data analysis from cloning attacks., , and . Multimedia Tools Appl., 75 (22): 14833-14848 (2016)Admission control in Peer-to-Peer: design and performance evaluation., , and . SASN, page 104-113. ACM, (2003)Experimenting with system and Libc call interception attacks on ARM-based Linux kernel., , and . SAC, page 631-632. ACM, (2011)Multiple Device Login Attacks and Countermeasures of Mobile VoIP Apps on Android., and . J. Internet Serv. Inf. Secur., 4 (4): 115-126 (2014)Comparative Analysis of Mobile App Reverse Engineering Methods on Dalvik and ART., , , and . J. Internet Serv. Inf. Secur., 6 (3): 27-39 (2016)Threshold cryptography in P2P and MANETs: The case of access control., , and . Comput. Networks, 51 (12): 3632-3649 (2007)