WORAL: A witness oriented secure location provenance framework for mobile devices

R Hasan, R Khan, S Zawoad… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Location-based services allow mobile device users to access various services based on the
users' current physical location information. Path-critical applications, such as supply chain …

OTIT: Towards secure provenance modeling for location proofs

R Khan, S Zawoad, MM Haque, R Hasan - Proceedings of the 9th ACM …, 2014 - dl.acm.org
Personal mobile devices and location based services are gaining popularity every day.
Since the location based services are often customized based on the location information, it …

Where have you been? secure location provenance for mobile devices

R Hasan, R Burns - arXiv preprint arXiv:1107.1821, 2011 - arxiv.org
With the advent of mobile computing, location-based services have recently gained
popularity. Many applications use the location provenance of users, ie, the chronological …

STAMP: Enabling privacy-preserving location proofs for mobile users

X Wang, A Pande, J Zhu… - IEEE/ACM transactions …, 2016 - ieeexplore.ieee.org
Location-based services are quickly becoming immensely popular. In addition to services
based on users' current location, many potential services rely on users' location history, or …

'who, when, and where?'location proof assertion for mobile devices

R Khan, S Zawoad, MM Haque, R Hasan - Data and Applications Security …, 2014 - Springer
In recent years, location of mobile devices has become an important factor. Mobile device
users can easily access various customized applications from the service providers based …

STAMP: Ad hoc spatial-temporal provenance assurance for mobile users

X Wang, J Zhu, A Pande, A Raghuramu… - 2013 21st IEEE …, 2013 - ieeexplore.ieee.org
Location-based services are quickly becoming immensely popular. In addition to services
based on users' current location, many potential services rely on users' location history, or …

Pasport: A secure and private location proof generation and verification framework

MR Nosouhi, K Sood, S Yu, M Grobler… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Recently, there has been a rapid growth in location-based systems and applications in
which users submit their location information to service providers in order to gain access to a …

CLIP: Continuous location integrity and provenance for mobile phones

C Lyu, A Pande, X Wang, J Zhu, D Gu… - 2015 IEEE 12th …, 2015 - ieeexplore.ieee.org
Many location-based services require a mobile user to continuously prove his location. In
absence of a secure mechanism, malicious users may lie about their locations to get these …

Proving your location without giving up your privacy

W Luo, U Hengartner - Proceedings of the Eleventh Workshop on Mobile …, 2010 - dl.acm.org
Although location-based applications have existed for several years, verifying the
correctness of a user's claimed location is a challenge that has only recently gained …

Protecting privacy and securing the gathering of location proofs–the secure location verification proof gathering protocol

M Graham, D Gray - International Conference on Security and Privacy in …, 2009 - Springer
As wireless networks become increasingly ubiquitous, the demand for a method of locating
a device has increased dramatically. Location Based Services are now commonplace but …