메뉴 건너뛰기




Volumn , Issue , 2009, Pages

Enabling new mobile applications with location proofs

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS POINTS; CORE FUNCTIONALITY; FUTURE APPLICATIONS; GEOGRAPHICAL LOCATIONS; KILLER-APPLICATION; LOCATION INFORMATION; MOBILE APPLICATIONS; MOBILE HANDHELD DEVICES; MOBILE USERS; PHYSICAL PROXIMITY; WIRELESS INFRASTRUCTURES; WIRELESS RADIOS; WIRELESS TRANSMITTER;

EID: 67650661394     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1514411.1514414     Document Type: Conference Paper
Times cited : (171)

References (17)
  • 1
    • 25844439422 scopus 로고    scopus 로고
    • Secure positioning of wireless devices with application to sensor networks
    • S. Capkun and J.-P. Hubaux. Secure positioning of wireless devices with application to sensor networks. In Proc. of IEEE INFOCOM, 2005.
    • (2005) Proc. of IEEE INFOCOM
    • Capkun, S.1    Hubaux, J.-P.2
  • 2
    • 1542341270 scopus 로고    scopus 로고
    • Location-based authentication: Grounding cyberspace for better security
    • Feb.
    • D. E. Denning and P. F. MacDoran. Location-Based Authentication: Grounding Cyberspace for Better Security, Feb. 1996. Computer Fraud & Security.
    • (1996) Computer Fraud & Security
    • Denning, D.E.1    MacDoran, P.F.2
  • 12
    • 67650691074 scopus 로고    scopus 로고
    • OpenID. http://openid.net/.
  • 17
    • 39349117902 scopus 로고    scopus 로고
    • Power-modulated challenge-response schemes for verifying location claims
    • Nov.
    • Y. Zhang, Z. Li, and W. Trappe. Power-Modulated Challenge-Response Schemes for Verifying Location Claims. In Proc. of IEEE Globecom, Nov. 2007.
    • (2007) Proc. of IEEE Globecom
    • Zhang, Y.1    Li, Z.2    Trappe, W.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.