Survey on Location Authentication Protocols and Spatial-Temporal Attestation Services
暂无分享,去创建一个
[1] Arturo Ribagorda,et al. Path-Stamps: A Proposal for Enhancing Security of Location Tracking Applications , 2003, CAiSE Workshops.
[2] David Chaum,et al. Distance-Bounding Protocols (Extended Abstract) , 1994, EUROCRYPT.
[3] David A. Wagner,et al. Secure verification of location claims , 2003, WiSe '03.
[4] Pascal Lorenz. Networking — ICN 2001 , 2001, Lecture Notes in Computer Science.
[5] Srdjan Capkun,et al. Securing position and distance verification in wireless networks , 2004 .
[6] Avishai Wool,et al. On location-restricted services , 1999 .
[7] Gaetano Borriello,et al. Location Systems for Ubiquitous Computing , 2001, Computer.
[8] Markus G. Kuhn,et al. An Asymmetric Security Mechanism for Navigation Signals , 2004, Information Hiding.
[9] E. F. Michiels,et al. ISO/IEC 10181-4:1995 Information technology Open Systems Interconnection Security frameworks for open systems: Non-repudiation framework , 1996 .
[10] Michael Kreutzer,et al. Enhancing applications with approved location stamps , 2001, IEEE Intelligent Network 2001 Workshop. IN 2001 Conference Record (Cat. No.01TH8566).
[11] Alf Zugenmaier,et al. Location Stamps for Digital Signatures: A New Service for Mobile Telephone Networks , 2001, ICN.
[12] Laurent Bussard. Trust establishment protocols for communicating devices , 2004 .
[13] Oscar Pozzobon,et al. Secure Tracking using Trusted GNSS Receivers and Galileo Authentication Services , 2004 .
[14] Srdjan Capkun,et al. SECTOR: secure tracking of node encounters in multi-hop wireless networks , 2003, SASN '03.
[15] Nikolaos Michalakis. Location-aware access control for pervasive computing environments , 2003 .
[16] Tim Kindberg,et al. Context authentication using constrained channels , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.
[17] Jin Nakazawa,et al. LEXP: Preserving User Privacy and Certifying the Location Information , 2003 .