Guaranteeing the authenticity of location information

AIGT Ferreres, BR Alvarez… - IEEE Pervasive …, 2008 - ieeexplore.ieee.org
Location authentication is a young security requirement that has recently arisen in
ubiquitous computing applications. During the last decade, researchers have proposed …

'who, when, and where?'location proof assertion for mobile devices

R Khan, S Zawoad, MM Haque, R Hasan - Data and Applications Security …, 2014 - Springer
In recent years, location of mobile devices has become an important factor. Mobile device
users can easily access various customized applications from the service providers based …

Proving your location without giving up your privacy

W Luo, U Hengartner - Proceedings of the Eleventh Workshop on Mobile …, 2010 - dl.acm.org
Although location-based applications have existed for several years, verifying the
correctness of a user's claimed location is a challenge that has only recently gained …

Protecting privacy and securing the gathering of location proofs–the secure location verification proof gathering protocol

M Graham, D Gray - International Conference on Security and Privacy in …, 2009 - Springer
As wireless networks become increasingly ubiquitous, the demand for a method of locating
a device has increased dramatically. Location Based Services are now commonplace but …

Strengthening authentication with privacy-preserving location verification of mobile phones

J Camenisch, DA Ortiz-Yepes, FS Preiss - … of the 14th ACM Workshop on …, 2015 - dl.acm.org
Mobile devices are increasingly used in security-sensitive contexts such as physical access
control and authorization of payment transactions. In this paper we contribute a mechanism …

Crepuscolo: A collusion resistant privacy preserving location verification system

ES Canlar, M Conti, B Crispo… - … Conference on Risks …, 2013 - ieeexplore.ieee.org
In location-sensitive applications (eg location-based access control, and location-based
social networks), users often benefit from being at a certain location. These benefits are …

Secure verification of location claims

N Sastry, U Shankar, D Wagner - Proceedings of the 2nd ACM workshop …, 2003 - dl.acm.org
With the growing prevalence of sensor and wireless networks comes a new demand for
location-based access control mechanisms. We introduce the concept of secure location …

Survey on location authentication protocols and spatial-temporal attestation services

AI González-Tablas, K Kursawe, B Ramos… - … on Embedded and …, 2005 - Springer
A survey on location authentication protocols and spatial-temporal attestation services is
presented. Several protocols and services with these objectives have been proposed during …

Pasport: A secure and private location proof generation and verification framework

MR Nosouhi, K Sood, S Yu, M Grobler… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Recently, there has been a rapid growth in location-based systems and applications in
which users submit their location information to service providers in order to gain access to a …

[PDF][PDF] Enhancing privacy and authentication for location based service using trusted authority

K Han, K Kim - 2nd Joint Workshop on Information Security, 2007 - caislab.kaist.ac.kr
Not only the privacy but also the authentication is an important issue using the location
based serviced in the critical areas, from forging the location information. There are many …