Authentication for tag-based content delivery

K Zhu - US Patent 9,208,293, 2015 - Google Patents
A method of authenticating a content reference that is related to a public information display
to reduce third party interference with the content reference is provided. The method …

Enforcing physically restricted access control for remote data

MS Kirkpatrick, S Kerr - Proceedings of the first ACM conference on Data …, 2011 - dl.acm.org
In a distributed computing environment, remote devices must often be granted access to
sensitive information. In such settings, it is desirable to restrict access only to known, trusted …

A location based security framework for authenticating mobile phones

L Francis, K Mayes, G Hancke… - Proceedings of the 2nd …, 2010 - dl.acm.org
Although the utilisation of location information in mobile network access systems has given
rise to a variety of applications and services, it is thought that the underlying service …

Physically restricted authentication with trusted hardware

MS Kirkpatrick, E Bertino - Proceedings of the 2009 ACM workshop on …, 2009 - dl.acm.org
Modern computer systems permit users to access protected information from remote
locations. In certain secure environments, it would be desirable to restrict this access to a …

Context-dependent authentication and access control

M Kirkpatrick, E Bertino - iNetSec 2009–Open Research Problems in …, 2009 - Springer
As mobile computing continues to rise, users are increasingly able to connect to remote
services from a wide range of settings. To provide this flexibility, security policies must be …

[PDF][PDF] A novel vision-based location authentication approach in a ubiquitous camera environment

HC Liao, PC Lee - Information Technology Journal, 2010 - cyut.edu.tw
Location-based services (LBSs) have been emerging in recent years. Mobile devices with
built-in GPS receiver (Global Positioning System), called GPS-enabled mobile devices, will …

Trusted enforcement of contextual access control

MS Kirkpatrick - 2011 - search.proquest.com
As computing environments become both mobile and pervasive, the need for robust and
flexible access control systems comes to the fore. Instead of relying simply on identity-based …

Enhancing credibility of location based service using multiple sensing technologies

K Han, K Kim, T Shon - IEICE transactions on information and …, 2011 - search.ieice.org
Recent Location Based Services (LBS) extend not only information services such as car
navigation services, but supporting various applications such as augmented reality and …

Towards a Stronger Location Integrity

R Xu, D Yu - Cambridge International Workshop on Security …, 2013 - Springer
Currently in mobile location-based services the application relies solely on the coordinates
provided by the phone's operating system to determine its location. The application residing …

Innovative Location Based Scheme for Internet Security Protocol. A proposed Location Based Scheme N-Kerberos Security Protocol Using Intelligent Logic of …

NT Abdelmajid - 2011 - bradscholars.brad.ac.uk
The importance of the data authentication has resulted in the science of the data protection.
Interest in this knowledge has been growing due to the increase in privacy of the user's …