1 |
Mincheol Kim, Jihyung Shin, Yunhwa Kim, Taelim Ha, Sun Shin, "2013 Korea Media Panel Research", Korea Information society development institute, 2013. http://www.kisdi.re.kr/kisdi/fp/kr/board/selectSingleBoar d.do?cmd=select SingleBoard&curPage=1&boardId=GPK_RND_DATA&seq=29270&reStep=8999&ctx=_
|
2 |
Mashable, Available at : http://www.mashable.com
|
3 |
Android LVL, Available at: http://developer.android.com/google/play/licensing/addin g-licensing.html
|
4 |
Hanbyul Baek, Eungyu Lee, Kanghee Kim, "A Mobile Application Anti-Piracy Technique Using Mandatory Access Control Based on User Preferences", Journal of Security Engineering, Vol.10, No.2, pp.151-162, 2013. http://www.sersc.org/journals/JSE/vol10_no2_2013/4.pdf
|
5 |
Sung-Ryul Kim, "Copy Protection System for Android App using Public Key Infrastructure", Journal of Security Engineering, Vol.9, No.1, pp.121-134, 2012. http://www.sersc.org/journals/JSE/vol9_no1_2012/11.pdf
|
6 |
H. Kim, "The Technology Trend of Forensic mark", Korea Copyright Commission, Sept. 2010. http://www.copyright.or.kr
|
7 |
Cheol Jeon, Yookun Cho, "A Robust Steganography-Based Software Watermarking", RACS 2012, San Antonio, TX, USA, 2012. http://dl.acm.org/citation.cfm?id=2401675
|
8 |
The Android Open Source Project. Dalvik optimization and verification with dexopt. Available at: http://www.netmite.com/android/mydroid/dalvik/docs/dexopt.html.
|
9 |
Security Enginering Research Group, "Analysis of Dalvik Virtual Machine and Class Path Library", 2010. "http://www.academia.edu/4768292/Analysis_of_Dalvik_Virtual_Machine_and_Class_Path_Library_Constrained_Intents_Extending_Android_Security_for_Intent_Policies_EASIP_"
|
10 |
Taeyoun Kim, Jihoon Park, Sangyup Kim, WangJae Yi, "Android Anatomy System Service", Developers Happy World, 2011.
|