{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:51:57Z","timestamp":1750308717267,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":7,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,10,23]],"date-time":"2012-10-23T00:00:00Z","timestamp":1350950400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,10,23]]},"DOI":"10.1145\/2401603.2401659","type":"proceedings-article","created":{"date-parts":[[2012,11,27]],"date-time":"2012-11-27T14:28:59Z","timestamp":1354026539000},"page":"253-256","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["A method for detecting illegally copied APK files on the network"],"prefix":"10.1145","author":[{"given":"Sungmin","family":"Kim","sequence":"first","affiliation":[{"name":"Soongsil University, Sangdo-Dong, Dongjak-gu, Seoul, Korea"}]},{"given":"Eunhoe","family":"Kim","sequence":"additional","affiliation":[{"name":"Soongsil University, Sangdo-Dong, Dongjak-gu, Seoul, Korea"}]},{"given":"Jaeyoung","family":"Choi","sequence":"additional","affiliation":[{"name":"Soongsil University, Sangdo-Dong, Dongjak-gu, Seoul, Korea"}]}],"member":"320","published-online":{"date-parts":[[2012,10,23]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Gartner press releases report of Mobile Market Share Devices by Region and Country 3Q11 2011.  Gartner press releases report of Mobile Market Share Devices by Region and Country 3Q11 2011."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICISA.2011.5772366"},{"key":"e_1_3_2_1_3_1","unstructured":"Eungyu Lee Yeongung Park Kanghee Kim Seongje Cho A Mobile Application Anti-Piracy Technique Using Mandatory Access Control. KIISSE Dependatble Computing 2012.  Eungyu Lee Yeongung Park Kanghee Kim Seongje Cho A Mobile Application Anti-Piracy Technique Using Mandatory Access Control . KIISSE Dependatble Computing 2012."},{"key":"e_1_3_2_1_4_1","unstructured":"Sung-Ryul Kim Copy Protection System for Android App using Public Key Infrastructure. Security Engineering Research Support Center 2012.  Sung-Ryul Kim Copy Protection System for Android App using Public Key Infrastructure. Security Engineering Research Support Center 2012."},{"key":"e_1_3_2_1_5_1","unstructured":"Joonhyouk Jang Cheol Jeon Bongjae Kim Jiyeon Park Wookun Cho Robust Static Software Watermarking Schem for Copyright Protection of Mobile Software. KIISSE Dependatble Computing 2012.  Joonhyouk Jang Cheol Jeon Bongjae Kim Jiyeon Park Wookun Cho Robust Static Software Watermarking Schem for Copyright Protection of Mobile Software . KIISSE Dependatble Computing 2012."},{"key":"e_1_3_2_1_6_1","first-page":"120","volume":"20","author":"Jung H. W.","year":"2005","journal-title":"Electronics and Telecommunications Reaserch Institute."},{"key":"e_1_3_2_1_7_1","unstructured":"Google Android developer reference paper http:\/\/developer.android.com\/guide\/developing  Google Android developer reference paper http:\/\/developer.android.com\/guide\/developing"}],"event":{"name":"RACS '12: Research in Applied Computation Symposium","sponsor":["ACCT Association of Convergent Computing Technology","SIGAPP ACM Special Interest Group on Applied Computing"],"location":"San Antonio Texas","acronym":"RACS '12"},"container-title":["Proceedings of the 2012 ACM Research in Applied Computation Symposium"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2401603.2401659","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2401603.2401659","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:14:27Z","timestamp":1750277667000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2401603.2401659"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10,23]]},"references-count":7,"alternative-id":["10.1145\/2401603.2401659","10.1145\/2401603"],"URL":"https:\/\/doi.org\/10.1145\/2401603.2401659","relation":{},"subject":[],"published":{"date-parts":[[2012,10,23]]},"assertion":[{"value":"2012-10-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}