Kounas et al., 2020 - Google Patents
QuietPlace: An ultrasound-based proof of location protocol with strong identitiesKounas et al., 2020
View HTML- Document ID
- 9025151385494607055
- Author
- Kounas D
- Voutyras O
- Palaiokrassas G
- Litke A
- Varvarigou T
- Publication year
- Publication venue
- Applied System Innovation
External Links
Snippet
Location-based services are becoming extremely popular due to the widespread use of smartphones and other mobile and portable devices. These services mainly rely on the sincerity of users, who can spoof the location they report to them. For applications with …
- 238000002604 ultrasonography 0 abstract description 32
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Kim et al. | A secure charging system for electric vehicles based on blockchain | |
Nkenyereye et al. | Secure and blockchain-based emergency driven message protocol for 5G enabled vehicular edge computing | |
Lee et al. | Secure three-factor authentication protocol for multi-gateway IoT environments | |
Chuang et al. | A lightweight continuous authentication protocol for the Internet of Things | |
Braeken et al. | Efficient and provably secure key agreement for modern smart metering communications | |
Zhang et al. | Privacy-preserving data aggregation against false data injection attacks in fog computing | |
Javed et al. | An efficient authentication scheme using blockchain as a certificate authority for the internet of drones | |
Martínez-Peláez et al. | An enhanced lightweight IoT-based authentication scheme in cloud computing circumstances | |
Al-Mekhlafi et al. | Efficient authentication scheme for 5G-enabled vehicular networks using fog computing | |
Bilal et al. | An authentication protocol for future sensor networks | |
Chang et al. | Enhanced two-factor authentication and key agreement using dynamic identities in wireless sensor networks | |
Nam et al. | A provably-secure ECC-based authentication scheme for wireless sensor networks | |
Kim et al. | Secure and privacy-preserving authentication scheme using decentralized identifier in metaverse environment | |
Renuka et al. | Cryptanalysis and improvement of a privacy-preserving three-factor authentication protocol for wireless sensor networks | |
Chen et al. | An enhanced lightweight dynamic pseudonym identity based authentication and key agreement scheme using wireless sensor networks for agriculture monitoring | |
Wang et al. | A secure and efficient handover authentication protocol for wireless networks | |
Rajasekaran et al. | Anonymous mutual and batch authentication with location privacy of UAV in FANET | |
Lin et al. | FAIDM for medical privacy protection in 5G telemedicine systems | |
Zafar et al. | Location proof systems for smart internet of things: Requirements, taxonomy, and comparative analysis | |
Du et al. | Blockchain-based authentication protocol design from a cloud computing perspective | |
Carlier et al. | Symmetric-key-based security for multicast communication in wireless sensor networks | |
Lansky et al. | Development of a lightweight centralized authentication mechanism for the Internet of Things driven by fog | |
Jan et al. | SELWAK: A secure and efficient lightweight and anonymous authentication and key establishment scheme for IoT based vehicular ad hoc networks | |
Lin | A privacy-preserved ID-based secure communication scheme in 5G-IoT telemedicine systems | |
Chang et al. | A secure three-factor anonymous user authentication scheme for internet of things environments |