Home > Refereed Conference Papers > Source Attribution of Cryptographic API Misuse in Android Applications > Keywords |
<record>
<controlfield tag="001">324</controlfield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">Static Analysis</subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">Source Attribution</subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">Android</subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">Cryptography APIs</subfield>
</datafield>
<datafield tag="653" ind1="1" ind2=" ">
<subfield code="a">Applied Cryptography</subfield>
</datafield>
</record>