Author of the publication

Enhancement of Permission Management for an ARM-Android Platform.

, , , , and . CIT, page 415-422. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Effective Usage and Access Control Scheme for Preventing Permission Leak in a Trusted Execution Environment., , , , and . ICCNS, page 6-10. ACM, (2016)Is your access allowed or not? A Verified Tag-based Access Control Framework for the Multi-domain TEE., , , , , , and . Internetware, page 252-261. ACM, (2022)Ultra High Throughput Implementations for MD5 Hash Algorithm on FPGA., , , and . HPCA (China), volume 5938 of Lecture Notes in Computer Science, page 433-441. Springer, (2009)Algorithm Analysis for Big Data in Education Based on Depth Learning., and . Wireless Personal Communications, 102 (4): 3111-3119 (2018)A Process Model for Forensic Analysis of Symbian Smart Phones., , , , and . FGIT-ASEA, volume 59 of Communications in Computer and Information Science, page 86-93. Springer, (2009)A Shape-inference-based Approach to Enhance Constraint Independence Optimization., , , and . ICCSP, page 141-145. ACM, (2020)Towards a multilayered permission-based access control for extending Android security., , , , , , , and . Concurr. Comput. Pract. Exp., (2018)Analysis of Cryptographic Algorithms' Characters in Binary File., , , and . PDCAT, page 219-223. IEEE, (2012)Implementing a hardware-assisted memory management mechanism for ARM platforms using the B method., , , , , and . Concurr. Comput. Pract. Exp., (2019)Enhancement of Permission Management for an ARM-Android Platform., , , , and . CIT, page 415-422. IEEE Computer Society, (2016)