Secure verification of location claims
暂无分享,去创建一个
[1] David Chaum,et al. Distance-Bounding Protocols (Extended Abstract) , 1994, EUROCRYPT.
[2] Dorothy E. Denning,et al. Location-based authentication: Grounding cyberspace for better security , 1996 .
[3] Andy Hopper,et al. A new location technique for the active office , 1997, IEEE Wirel. Commun..
[4] Avishai Wool,et al. How to prove where you are: tracking the location of customer equipment , 1998, CCS '98.
[5] Frank Stajano,et al. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.
[6] Robert Szewczyk,et al. System architecture directions for networked sensors , 2000, ASPLOS IX.
[7] Philippe Debaty,et al. Creating Web Representations for Places , 2000, HUC.
[8] Paramvir Bahl,et al. RADAR: an in-building RF-based user location and tracking system , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).
[9] Seth J. Teller,et al. The cricket compass for context-aware mobile applications , 2001, MobiCom '01.
[10] J. A. Volpe. Vulnerability Assessment of the Transportation Infrastructure Relying on the Global Positioning Syst , 2001 .
[11] Yih-Chun Hu. Packet Leashes : A Defense against Wormhole Attacks in Wireless Ad Hoc Networks , 2001 .
[12] Diana K. Smetters,et al. Talking to Strangers: Authentication in Ad-Hoc Wireless Networks , 2002, NDSS.
[13] Kostas E. Bekris,et al. Robotics-Based Location Sensing Using Wireless Ethernet , 2002, MobiCom '02.
[14] J. Elson,et al. Fine-grained network time synchronization using reference broadcasts , 2002, OSDI '02.
[15] Deborah Estrin,et al. Locating tiny sensors in time and space: a case study , 2002, Proceedings. IEEE International Conference on Computer Design: VLSI in Computers and Processors.
[16] Brian D. Noble,et al. Zero-interaction authentication , 2002, MobiCom '02.
[17] Tim Kindberg,et al. Context authentication using constrained channels , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.
[18] Dan S. Wallach,et al. Wireless LAN location-sensing for security applications , 2003, WiSe '03.
[19] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[20] Mikhail Nesterenko,et al. Secure Location Verification Using Radio Broadcast , 2004, OPODIS.