Guaranteeingauthenticity of Location information
暂无分享,去创建一个
[1] Laurent Bussard. Trust establishment protocols for communicating devices , 2004 .
[2] Markus G. Kuhn,et al. An Asymmetric Security Mechanism for Navigation Signals , 2004, Information Hiding.
[3] O. Pozzobon,et al. TRUST YOUR RECEIVER? ENHANCING LOCATION SECURITY , 2004 .
[4] Markus G. Kuhn,et al. An RFID Distance Bounding Protocol , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[5] Klaus Kursawe,et al. Survey on Location Authentication Protocols and Spatial-Temporal Attestation Services , 2005, EUC Workshops.
[6] Gaetano Borriello,et al. Location Systems for Ubiquitous Computing , 2001, Computer.
[7] Mikhail Nesterenko,et al. Secure Location Verification Using Radio Broadcast , 2004, IEEE Transactions on Dependable and Secure Computing.
[8] Wade Trappe,et al. Robust statistical methods for securing wireless localization in sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..
[9] Richard R. Muntz,et al. Challenges in Location-Aware Computing , 2003, IEEE Pervasive Comput..
[10] Radha Poovendran,et al. Distance Bounding Protocols: Authentication Logic Analysis and Collusion Attacks , 2007, Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks.
[11] Srdjan Capkun,et al. Secure positioning in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.
[12] Radha Poovendran,et al. SeRLoc: Robust localization for wireless sensor networks , 2005, TOSN.
[13] Markus G. Kuhn,et al. So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks , 2006, ESAS.
[14] Juan Manuel González Nieto,et al. Detecting relay attacks with timing-based protocols , 2007, ASIACCS '07.
[15] Prathima Agrawal,et al. Secure localization in sensor networks using transmission range variation , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..
[16] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[17] David Chaum,et al. Distance-Bounding Protocols (Extended Abstract) , 1994, EUROCRYPT.
[18] Tim Kindberg,et al. Context authentication using constrained channels , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.
[19] Dorothy E. Denning,et al. Location-based authentication: Grounding cyberspace for better security , 1996 .
[20] David A. Wagner,et al. Secure verification of location claims , 2003, WiSe '03.