Open Access
ARTICLE
V. Joseph Raymond1,2,*, R. Jeberson Retna Raj1
1 Department of Computer Science and Engineering, Sathyabama Institute of Science and Technology, Chennai, 600119, Tamilnadu, India
2 School of Computing, SRM Institute of Science and Technology, Chennai, 603203, Tamilnadu, India
* Corresponding Author: V. Joseph Raymond. Email:
Intelligent Automation & Soft Computing 2023, 35(2), 2413-2429. https://doi.org/10.32604/iasc.2023.030527
Received 28 March 2022; Accepted 05 May 2022; Issue published 19 July 2022
View
Download
Like
Provably Secure APK Redevelopment Authorization Scheme in the Standard Model
Daofeng Li, Mingxing Luo, Bowen...CM-Droid: Secure Container for Android Password Misuse Vulnerability
Wen Zhang, Keyue Li, Tianyang...A Quantum Authorization Management Protocol Based on EPR-Pairs
Yan Chang, Shibin Zhang, Lili...Programming Logic Modeling and Cross-Program Defect Detection Method for Object-Oriented Code
Yan Liu, Wenyuan Fang, Qiang Wei,...Protecting Android Applications with Multiple DEX Files Against Static Reverse Engineering Attacks
Kyeonghwan Lim, Nak Young Kim,...