Secure Location Verification: Why You Want Your Verifiers to Be Mobile.
Matthias SchäferCarolina NogueiraJens B. SchmittVincent LendersPublished in: CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS (2019)
Keyphrases
- mobile objects
- location dependent
- mobile phone
- integrity verification
- mobility patterns
- cryptographic protocols
- mobile devices
- location information
- mobile environments
- location tracking
- location based services
- location management
- high security
- mobile users
- face verification
- context aware
- formal verification
- mobile commerce
- mobile applications
- key distribution
- global positioning system
- signature verification
- location prediction
- mobile networks
- verification method
- mobile computing
- mobile learning
- lightweight
- heterogeneous platforms