1. Naghizadeh, A., Razeghi, B., Meamari, E., Hatamian, M., Atani, R.E.: C-trust: a trust management system to improve fairness on circular P2P networks. Peer-to-Peer Netw. Appl. 9(6), 1128–1144 (2016)
2. Smartphone OS Market Share, 2016 Q2. https://www.idc.com/prodserv/smartphone-os-market-share.jsp . Accessed 6 Dec 2016
3. $$97\%$$ of malicious mobile malware targets Android. http://www.scmagazineuk.com/updated-97-of-malicious-mobile-malware-targets-android/article/422783/ . Accessed 6 Dec 2016
4. Bal, G., Rannenberg, K.: User control mechanisms for privacy protection shouldgo hand in hand with privacy-consequence information: the case of smartphone apps. In: Proceedings of W3C Workshop on Privacy and User-Centric Controls, pp. 1–5, Germany (2014)
5. Android Developers. https://developer.android.com/index.html . Accessed 6 April 2017