메뉴 건너뛰기




Volumn 1, Issue , 2009, Pages 586-597

Robust location tag generation from noisy location data for security applications

Author keywords

[No Author keywords available]

Indexed keywords

ACHIEVABLE PERFORMANCE; DISTANCE MEASURE; ENTROPY LOSS; ERROR TOLERANT; EUCLIDEAN; FUZZY EXTRACTORS; LOCATION BASED; LOCATION DATA; LOCATION INFORMATION; LOCATION PARAMETERS; LOCATION VERIFICATION; OPTIMAL DESIGN PARAMETERS; SECURITY APPLICATION; SECURITY SERVICES; TAG GENERATION; TEMPORAL CHANGE;

EID: 70449638421     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (14)

References (15)
  • 2
    • 70449635437 scopus 로고    scopus 로고
    • B. Schneier. Kill Switches and Remote Control. A blog covering security and security technology. July 1, 2008.
    • B. Schneier. "Kill Switches and Remote Control". A blog covering security and security technology. July 1, 2008.
  • 3
    • 34547973961 scopus 로고    scopus 로고
    • Location Based Encryption & Its Role In Digital Cinema Distribution
    • L. Scott and D. Denning, "Location Based Encryption & Its Role In Digital Cinema Distribution", Proceedings of ION GPS/GNSS 2003, pp288-297.
    • (2003) Proceedings of ION GPS/GNSS , pp. 288-297
    • Scott, L.1    Denning, D.2
  • 5
    • 58449100734 scopus 로고    scopus 로고
    • Security Analysis of Geoencryption: A Case Study using Loran
    • D. Qiu, "Security Analysis of Geoencryption: A Case Study using Loran", Proceeding of ION GNSS 2007.
    • Proceeding of ION GNSS 2007
    • Qiu, D.1
  • 10
    • 35048865463 scopus 로고    scopus 로고
    • Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
    • Eurocrpt'04, of, Springer-Verlag
    • Y. Dodis, L. Reyzin, and A. Smith. "Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data". Eurocrpt'04, vol. 3027 of LNCS, pp523-540. Springer-Verlag, 2004.
    • (2004) LNCS , vol.3027 , pp. 523-540
    • Dodis, Y.1    Reyzin, L.2    Smith, A.3
  • 11
    • 34247393528 scopus 로고    scopus 로고
    • Cryptology ePrint Archive, Report 2005/145 (2005)
    • E. Chang and Q. Li. "Small Secure Sketch for Point-set Difference". Cryptology ePrint Archive, Report 2005/145 (2005).
    • Chang, E.1    Li, Q.2
  • 13
    • 0032116945 scopus 로고    scopus 로고
    • Decoder Error and Failure Probabilities for Reed-Solomon Codes: Decodable Vectors Methods
    • July
    • A. Daraiseh and C. Baum. "Decoder Error and Failure Probabilities for Reed-Solomon Codes: Decodable Vectors Methods". IEEE Trans. Commun. 46(7), July 1998, pp. 857-859.
    • (1998) IEEE Trans. Commun , vol.46 , Issue.7 , pp. 857-859
    • Daraiseh, A.1    Baum, C.2
  • 15
    • 70449674598 scopus 로고    scopus 로고
    • A Discussion of the Importance of Key Length in Symmetric and Asymmetric Cryptography
    • L. Williams, "A Discussion of the Importance of Key Length in Symmetric and Asymmetric Cryptography". SAN Institute 2000-2002.
    • SAN Institute 2000-2002
    • Williams, L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.