A location authentication scheme based on adjacent users
暂无分享,去创建一个
[1] Stuart Haber,et al. Authenticating a mobile device's location using voice signatures , 2012, 2012 IEEE 8th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[2] Vitaly Shmatikov,et al. Secure Verification of Location Claims with Simultaneous Distance Modification , 2007, ASIAN.
[3] David A. Wagner,et al. Secure verification of location claims , 2003, WiSe '03.
[4] Feng Xia,et al. Safety Challenges and Solutions in Mobile Social Networks , 2013, IEEE Systems Journal.
[5] SrivastavaMani,et al. Secure Location Verification with Hidden and Mobile Base Stations , 2008 .
[6] Robert A. Malaney. Securing internal Wi-Fi networks with position verification , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..
[7] Dan Wu,et al. A Node-to-Node Location Verification Method , 2010, IEEE Transactions on Industrial Electronics.
[8] Srdjan Capkun,et al. Secure Location Verification with Hidden and Mobile Base Stations , 2008, IEEE Transactions on Mobile Computing.
[9] Reihaneh Safavi-Naini,et al. Secure Localization Using Dynamic Verifiers , 2011, ESORICS.
[10] Junzhou Luo,et al. MPSL: A Mobile Phone-Based Physical-Social Location Verification System , 2012, WASA.
[11] Guohong Cao,et al. APPLAUS: A Privacy-Preserving Location Proof Updating System for location-based services , 2011, 2011 Proceedings IEEE INFOCOM.
[12] Donggang Liu,et al. Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).
[13] Yong Guan,et al. Lightweight Location Verification Algorithms for Wireless Sensor Networks , 2013, IEEE Transactions on Parallel and Distributed Systems.
[14] Mikhail Nesterenko,et al. Secure Location Verification Using Radio Broadcast , 2004, IEEE Transactions on Dependable and Secure Computing.