Withstand App Clone Attack by Using Undeniable Signature
碩士 === 國立臺灣科技大學 === 資訊管理系 === 103 === The concept of copy protection mechanism based on dynamic loading for android application was proposed by Tsai, Chiu and Wu in 2014. To prevent the application suffering unauthorized copy and distribute, when unauthorized users obtain the application installatio...
Main Authors: | Chia-Ling Ou, 歐佳綾 |
---|---|
Other Authors: | Tzong-Chen Wu |
Format: | Others |
Language: | zh-TW |
Published: |
2015
|
Online Access: | http://ndltd.ncl.edu.tw/handle/70413190013466942058 |
Similar Items
-
The Study of Undeniable Signatures and Their Applications
by: Yen-Cheng Chen, et al.
Published: (2002) -
Digital signatures : a survey of undeniable signatures
by: Yeung, Jacqueline Fai.
Published: (1998) -
ID-Based and Undeniable Proxy Signature Schemes
by: BingRu Ke, et al.
Published: (2001) -
A Conic RSA Based Convertible Undeniable Signature
by: Hsin-Hsien Lu, et al.
Published: (2012) -
Anonymous (Multi-)Proxy Signature Scheme with Undeniable Agent
by: Ching-Chung Chan, et al.
Published: (2004)