Return to Article Details
A formal approach for the verification of the permission-based security model of Android
Download
Download PDF