Security from Location

The emergence of the Internet and personal computers has led to an age of unprecedented information content and access. The proliferation of Internet connectivity, personal computers, and portable, high density data storage has put volumes of data are at one’s fingertips. While the spread of such technology has increased efficiency and knowledge, it has also made information theft easier and more damaging.

[1]  Solomon Kullback,et al.  Information Theory and Statistics , 1960 .

[2]  Per K. Enge,et al.  Global positioning system: signals, measurements, and performance [Book Review] , 2002, IEEE Aerospace and Electronic Systems Magazine.

[3]  Carl W. Baum,et al.  Decoder error and failure probabilities for Reed-Solomon codes: decodable vectors method , 1998, IEEE Trans. Commun..

[4]  Martin Wattenberg,et al.  A fuzzy commitment scheme , 1999, CCS '99.

[5]  Paramvir Bahl,et al.  RADAR: an in-building RF-based user location and tracking system , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).

[6]  Dawn Song,et al.  The TESLA Broadcast Authentication Protocol , 2002 .

[7]  Henry Tirri,et al.  A Probabilistic Approach to WLAN User Location Estimation , 2002, Int. J. Wirel. Inf. Networks.

[8]  Dorothy E. Denning,et al.  Location Based Encryption and Its Role In Digital Cinema Distribution , 2003 .

[9]  D. Denning,et al.  A Location Based Encryption Technique and Some of Its Applications , 2003 .

[10]  Xavier Boyen,et al.  Reusable cryptographic fuzzy extractors , 2004, CCS '04.

[11]  Anil K. Jain,et al.  Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.

[12]  O. Pozzobon,et al.  Requirements for enhancing trust, security and integrity of GNSS location services , 2004 .

[13]  Douglas R. Stinson Cryptography: Theory and Practice, Third Edition , 2005 .

[14]  O. Pozzobon,et al.  Signal authentication and integrity schemes for next generation global navigation satellite systems , 2005 .

[15]  Ee-Chien Chang,et al.  Small Secure Sketch for Point-Set Difference , 2005, IACR Cryptol. ePrint Arch..

[16]  Ee-Chien Chang,et al.  Hiding Secret Points Amidst Chaff , 2006, EUROCRYPT.

[17]  Madhu Sudan,et al.  A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..

[18]  Per Enge,et al.  Geoencryption Using Loran , 2007 .

[19]  Di Qiu Security Analysis of Geoencryption: A Case Study Using Loran , 2007 .

[20]  Per Enge,et al.  Assessment of the Methodology for Bounding Loran Temporal ASF for Aviation , 2008 .

[21]  Sherman Lo,et al.  A measure of Loran location-based information , 2008, 2008 IEEE/ION Position, Location and Navigation Symposium.

[22]  Rafail Ostrovsky,et al.  Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..

[23]  David Lee,et al.  A Miniature LORAN H-Field Antenna for Low-Profile Conformal Hybrid Applications , 2009 .

[24]  Dan Boneh,et al.  Reliable Location-Based Services from Radio Navigation Systems , 2010, Sensors.