A Defense Mechanism Against Location Cheating Attack in Social Network
暂无分享,去创建一个
[1] Mathieu Cunche,et al. I know your MAC address: targeted tracking of individual using Wi-Fi , 2014, Journal of Computer Virology and Hacking Techniques.
[2] Nicholas Hopper,et al. Efficient Private Proximity Testing with GSM Location Sketches , 2012, Financial Cryptography.
[3] Srdjan Capkun,et al. Attacks on public WLAN-based positioning systems , 2009, MobiSys '09.
[4] Suela Kodra. Fuzzy extractors : How to generate strong keys from biometrics and other noisy data , 2015 .
[5] Matthew Smith,et al. SnapMe if you can: privacy threats of other peoples' geo-tagged media and what we can do about it , 2013, WiSec '13.
[6] Ming Li,et al. Location Based Handshake and Private Proximity Test with Location Tags , 2017, IEEE Transactions on Dependable and Secure Computing.
[7] Wasis Unggul Saputro. Analisis Performance Jaringan Nirkabel MenggunakanAircrack-Ng Dan Wireshark , 2012 .
[8] Per Enge,et al. Robust Location Tag Generation from Noisy Location Data for Security Applications , 2009 .
[9] Zhou Ao. Location-Based Services: Architecture and Progress , 2011 .
[10] Aoying Zhou,et al. Location-Based Services: Architecture and Progress: Location-Based Services: Architecture and Progress , 2011 .
[11] Keshav Jindal,et al. Analyzing Spoofing Attacks in Wireless Networks , 2014, 2014 Fourth International Conference on Advanced Computing & Communication Technologies.