메뉴 건너뛰기




Volumn , Issue , 2010, Pages 151-162

Mobile User Location-specific Encryption (MULE): Using your office as your password

Author keywords

Key derivation; Laptop theft; Location based access; Security

Indexed keywords

HOME USE; LOCATION BASED; MOBILE USERS; PLUG-AND-PLAY; SENSITIVE INFORMATIONS; USER INVOLVEMENT;

EID: 77952333072     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1741866.1741892     Document Type: Conference Paper
Times cited : (24)

References (35)
  • 4
  • 23
    • 33845572567 scopus 로고    scopus 로고
    • Privacy Rights Clearinghouse
    • Privacy Rights Clearinghouse. A chronology of data breaches. http://www.privacyrights.org/ar/ ChronDataBreaches.htm.
    • A Chronology of Data Breaches
  • 26
    • 84875683653 scopus 로고    scopus 로고
    • RSA Labortories
    • RSA Labortories. RSA SecurID. http://www.rsa.com/rsalabs/node.asp?id= 1156.
    • RSA SecurID
  • 31
    • 0001831930 scopus 로고    scopus 로고
    • The resurrecting duckling: Security issues for ad-hoc wireless networks
    • F. Stajano and R. J. Anderson. The resurrecting duckling: Security issues for ad-hoc wireless networks. In Security Protocols Workshop, 1999.
    • (1999) Security Protocols Workshop
    • Stajano, F.1    Anderson, R.J.2
  • 33
    • 77952327285 scopus 로고    scopus 로고
    • TPM main specification
    • Trusted Computing Group Trusted Computing Group, July
    • Trusted Computing Group. TPM main specification. Main Specification Version 1.2 rev. 103, Trusted Computing Group, July 2007.
    • (2007) Main Specification Version 1.2 Rev. , vol.103


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.