Security from Location
暂无分享,去创建一个
[1] Solomon Kullback,et al. Information Theory and Statistics , 1960 .
[2] Per K. Enge,et al. Global positioning system: signals, measurements, and performance [Book Review] , 2002, IEEE Aerospace and Electronic Systems Magazine.
[3] Carl W. Baum,et al. Decoder error and failure probabilities for Reed-Solomon codes: decodable vectors method , 1998, IEEE Trans. Commun..
[4] Martin Wattenberg,et al. A fuzzy commitment scheme , 1999, CCS '99.
[5] Paramvir Bahl,et al. RADAR: an in-building RF-based user location and tracking system , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).
[6] Dawn Song,et al. The TESLA Broadcast Authentication Protocol , 2002 .
[7] Henry Tirri,et al. A Probabilistic Approach to WLAN User Location Estimation , 2002, Int. J. Wirel. Inf. Networks.
[8] Dorothy E. Denning,et al. Location Based Encryption and Its Role In Digital Cinema Distribution , 2003 .
[9] D. Denning,et al. A Location Based Encryption Technique and Some of Its Applications , 2003 .
[10] Xavier Boyen,et al. Reusable cryptographic fuzzy extractors , 2004, CCS '04.
[11] Anil K. Jain,et al. Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.
[12] O. Pozzobon,et al. Requirements for enhancing trust, security and integrity of GNSS location services , 2004 .
[13] Douglas R. Stinson. Cryptography: Theory and Practice, Third Edition , 2005 .
[14] O. Pozzobon,et al. Signal authentication and integrity schemes for next generation global navigation satellite systems , 2005 .
[15] Ee-Chien Chang,et al. Small Secure Sketch for Point-Set Difference , 2005, IACR Cryptol. ePrint Arch..
[16] Ee-Chien Chang,et al. Hiding Secret Points Amidst Chaff , 2006, EUROCRYPT.
[17] Madhu Sudan,et al. A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..
[18] Per Enge,et al. Geoencryption Using Loran , 2007 .
[19] Di Qiu. Security Analysis of Geoencryption: A Case Study Using Loran , 2007 .
[20] Per Enge,et al. Assessment of the Methodology for Bounding Loran Temporal ASF for Aviation , 2008 .
[21] Sherman Lo,et al. A measure of Loran location-based information , 2008, 2008 IEEE/ION Position, Location and Navigation Symposium.
[22] Rafail Ostrovsky,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..
[23] David Lee,et al. A Miniature LORAN H-Field Antenna for Low-Profile Conformal Hybrid Applications , 2009 .
[24] Dan Boneh,et al. Reliable Location-Based Services from Radio Navigation Systems , 2010, Sensors.