Author:
Castrucci Alessandro,Martinelli Fabio,Mori Paolo,Roperti Francesco
Publisher
Springer Berlin Heidelberg
Reference17 articles.
1. Lecture Notes in Computer Science;F. Baiardi,2004
2. Debbabi, M., Saleh, M., Talhi, C., Zhioua, S.: Java for mobile devices: A security study. In: ACSAC 2005, pp. 235–244. IEEE Computer Society, Los Alamitos (2005)
3. Debbabi, M., Saleh, M., Talhi, C., Zhioua, S.: Security analysis of mobile java. In: Proceedings of the Sixteenth International Workshop on Database and Expert Systems Applications, 2005, pp. 231–235. IEEE Computer Society, Los Alamitos (2005)
4. Debbabi, M., Saleh, M., Talhi, C., Zhioua, S.: Security evaluation of J2ME CLDC embedded java platform. Journal of Object Technology 2(5), 125–154 (2006)
5. Hoare, C.A.R.: Communicating sequential processes. Commun. ACM 21(8), 666–677 (1978)
Cited by
14 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. POSTER;Proceedings of the 2018 on Asia Conference on Computer and Communications Security;2018-05-29
2. Application Security for Mobile Devices;Standards and Standardization;2015
3. DroidForce: Enforcing Complex, Data-centric, System-wide Policies in Android;2014 Ninth International Conference on Availability, Reliability and Security;2014-09
4. Testing of PolPA-based usage control systems;Software Quality Journal;2013-08-22
5. A Survey on Security for Mobile Devices;IEEE Communications Surveys & Tutorials;2013