Secure Location Verification with a Mobile Receiver.
Richard BakerIvan MartinovicPublished in: CPS-SPC@CCS (2016)
Keyphrases
- cryptographic protocols
- mobile objects
- location dependent
- mobile devices
- location management
- mobile phone
- mobility patterns
- model checking
- wireless medium
- integrity verification
- context aware
- geo tagged
- location tracking
- mobile applications
- mobile environments
- mobile learning
- location information
- mobile computing
- mobile networks
- formal verification
- smart phones
- high security
- signature verification
- computer simulation
- factor authentication
- mobile services
- sensitive data
- security requirements