%PDF-1.4
%
1 0 obj
<>stream
application/pdfIEEEIEEE Internet of Things Journal;2019;6;2;10.1109/JIOT.2018.2877174Androiddevice-to-device (D2D)information securityInternet of Things (IoT)overprivilegeSecurity Analysis of Mobile Device-to-Device Network ApplicationsKecheng LiuWenlong ShenYu ChengLin X. CaiQing LiSheng ZhouZhisheng Niu
IEEE Internet of Things Journal2922 April 20192610.1109/JIOT.2018.28771742932
endstream
endobj
2 0 obj
<>
endobj
3 0 obj
<>
endobj
4 0 obj
<>
endobj
5 0 obj
<>stream
hެ[[s6~ׯ#fBx9o$J,ɑd>P#JdD*L_Syr uN Kۃo^Cqxp,Te1:[ajEktkq|DZ9]BHJn9jYnOJ\xG痷gחg[-Lt*p}9S&:~w%0BDWX"Yq[]^By䞎_:_$E>)L04h*aZTiE<@&6m۬\uS˂%it~OytSW1tQX45Vqx&
m cJn^8W6 d|Kl(bE?/fU].;"ngμh߶koWmiʵ$(۶ڼp{mVmYl:ߡz;+(,H%o,9hȤ#DUE$x>M[Te9tN΄uV*KXژ)6)ks^55jYG2Zqу:\?6@u<]\/9KjS;eKOndjs'ZX)x8BGqPr2Z5ٸ{ K~mk`6riȺWwg%=j R`sq
U+,Ap}D(_2NNʬNR`lu:9;57Mi[M'3VQQp^WʂMBd#d60GNhhܳ04cP
YTKըr )o`9G"6jfZ}͔ԁb/ͧYc`0JGY'q$\ qDs~op7W= KGd]P- @Aw]IU{$k tUs=*,Z]CR#oOuN%]
2Xe.~
eewYIyyԑgg3ؽMxD(FCP:x*>1_bĄlxr `}-sn`+
f@Gd<4/$צlͦ7f5,R%= :({~T~
\¦uT؈)k>GЅ,NPޔ$cʠ#Z!P%l@S1*I)#^(dJj
p (Våb[j+:\0xPٵ|Wm}BHѡ*09]Vi:v$WJAR@;Wf( *ToqR`@, *,P!.H50ctB~ONN~N)HiO!]MB%S,9g}{
s<<>l˃kuU