Cited By
View all- Barrera DClark JMcCarney Dvan Oorschot PYu TEnck WJiang X(2012)Understanding and improving app installation security mechanisms through empirical analysis of androidProceedings of the second ACM workshop on Security and privacy in smartphones and mobile devices10.1145/2381934.2381949(81-92)Online publication date: 19-Oct-2012
- González Muñiz MLaud PChu WWong WPalakal MHung C(2011)On the (im)possibility of perennial message recognition protocols without public-key cryptographyProceedings of the 2011 ACM Symposium on Applied Computing10.1145/1982185.1982508(1510-1515)Online publication date: 21-Mar-2011
- Mashatan AVaudenay S(2010)A message recognition protocol based on standard assumptionsProceedings of the 8th international conference on Applied cryptography and network security10.5555/1894302.1894332(384-401)Online publication date: 22-Jun-2010
- Show More Cited By