How to Construct Secure Cryptographic Location-Based Services.
Jun AnzaiTsutomu MatsumotoPublished in: EUC Workshops (2005)
Keyphrases
- location based services
- mobile devices
- user privacy
- key management
- mobile users
- cryptographic protocols
- security protocols
- location aware
- location privacy
- spatial data
- road network
- location information
- encryption key
- encryption scheme
- mobile applications
- mobile environments
- geographic regions
- uncertain data
- smart card
- moving object databases
- google maps
- lightweight
- machine learning
- wireless internet
- security requirements
- mobile phone
- knowledge discovery
- three dimensional