Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014 (2014), Article ID 295789, 6 pages
http://dx.doi.org/10.1155/2014/295789
Research Article

Software Authority Transition through Multiple Distributors

1University of Michigan, 500 S. State Street, Ann Arbor, MI 48109, USA
2Department of Information Computer Engineering, Ajou University, San 5, Woncheon-dong, Yeongtong-gu, Suwon 443-749, Republic of Korea

Received 4 June 2014; Accepted 2 July 2014; Published 20 July 2014

Academic Editor: Sang-Soo Yeo

Copyright © 2014 Kyusunk Han and Taeshik Shon. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. K. Han and T. Shon, “Authentication of mobile applications through various local distributors,” Multimedia Tools and Applications, 2013. View at Publisher · View at Google Scholar · View at Scopus
  2. K. Fukushima, S. Kiyomoto, and Y. Miyake, “Software protection combined with tamper-proof device,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. E95.A, no. 1, pp. 213–222, 2012. View at Publisher · View at Google Scholar · View at Scopus
  3. G. Horvat, D. Sostaric, and D. Zagar, “Multi-agent based software licensing model for embedded systems,” in Agent and Multi-Agent Systems. Technologies and Applications, G. Jezic, M. Kusek, N.-T. Nguyen, R. Howlett, and L. Jain, Eds., vol. 7327 of Lecture Notes in Computer Science, pp. 648–657, Springer, Berlin, Germany, 2012. View at Google Scholar
  4. W. Liu, “Software protection with encryption and verification,” in Software Engineering and Knowledge Engineering: Theory and Practice, Y. Wu, Ed., vol. 115 of Advances in Intelligent and Soft Computing, pp. 131–138, Springer, Berlin, Germany, 2012. View at Google Scholar
  5. M. Backes, S. Gerling, and P. von Styp-Rekowsky, “A novel attack against android phones,” http://arxiv.org/abs/1106.4184.
  6. P. Albano, A. Castiglione, G. Cattaneo, and A. de Santis, “A novel anti-forensics technique for the android OS,” in Proceedings of the 6th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA '11), pp. 380–385, October 2011. View at Publisher · View at Google Scholar · View at Scopus
  7. F. di Cerbo, A. Girardello, F. Michahelles, and S. Voronkova, “Detection of malicious applications on android OS,” in Proceedings of the 4th International Conference on Computational Forensics (IWCF ’10), pp. 138–149, Springer, Berlin, Heidelberg, 2011.
  8. W. Enck, D. Octeau, P. McDaniel, and S. Chaudhuri, “A study of android application security,” in Proceedings of the 20th USENIX Conference on Security (SEC ’11), p. 21, USENIX Association, Berkeley, Calif, USA, 2011.
  9. W. Zhou, Y. Zhou, X. Jiang, and P. Ning, “Detecting repackaged smartphone applications in third-party android marketplaces,” in Proceedings of the 2nd ACM Conference on Data and Application Security and Privacy (CODASPY '12), pp. 317–326, ACM, San Antonio, Tex, USA, 2012.