Blockchain–Based Location Proof Generation and Verification
暂无分享,去创建一个
[1] Alec Wolman,et al. Enabling new mobile applications with location proofs , 2009, HotMobile '09.
[2] Maria Luisa Damiani,et al. Location privacy models in mobile applications: conceptual view and research directions , 2014, GeoInformatica.
[3] Reza Curtmola,et al. LINK: Location Verification through Immediate Neighbors Knowledge , 2010, MobiQuitous.
[4] Serge Vaudenay,et al. The Bussard-Bagga and Other Distance-Bounding Protocols under Attacks , 2012, Inscrypt.
[5] Jing Chen,et al. CertChain: Public and Efficient Certificate Audit Based on Blockchain for TLS Connections , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications.
[6] Sanjay Jha,et al. I Am Alice, I Was in Wonderland: Secure Location Proof Generation and Verification Protocol , 2016, 2016 IEEE 41st Conference on Local Computer Networks (LCN).
[7] Hai Liu,et al. Spatiotemporal correlation-aware dummy-based privacy protection scheme for location-based services , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.
[8] Shui Yu,et al. Big Privacy: Challenges and Opportunities of Privacy Study in the Age of Big Data , 2016, IEEE Access.
[9] Gang Wang,et al. On the validity of geosocial mobility traces , 2013, HotNets.
[10] Guohong Cao,et al. APPLAUS: A Privacy-Preserving Location Proof Updating System for location-based services , 2011, 2011 Proceedings IEEE INFOCOM.
[11] Elaine Shi,et al. Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[12] Matthew K. Franklin,et al. Privacy-preserving alibi systems , 2012, ASIACCS '12.
[13] Abdelhakim Hafid,et al. K-anonymous location-based fine-grained access control for mobile cloud , 2016, 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC).
[14] Prasant Mohapatra,et al. STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users , 2016, IEEE/ACM Transactions on Networking.
[15] Serge Vaudenay,et al. Challenges in Distance Bounding , 2015, IEEE Security & Privacy.
[16] Björn Scheuermann,et al. Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies , 2016, IEEE Communications Surveys & Tutorials.
[17] Sébastien Gambs,et al. PROPS: A PRivacy-Preserving Location Proof System , 2014, 2014 IEEE 33rd International Symposium on Reliable Distributed Systems.
[18] Harry Halpin,et al. Introduction to Security and Privacy on the Blockchain , 2017, 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).
[19] Leandros Tassiulas,et al. Stochastic Models and Wide-Area Network Measurements for Blockchain Design and Analysis , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications.
[20] Laurent Bussard,et al. Distance-Bounding Proof of Knowledge to Avoid Real-Time Attacks , 2005, SEC.
[21] Serge Vaudenay,et al. Practical and provably secure distance-bounding , 2013, J. Comput. Secur..