Secure Location Verification - A Security Analysis of GPS Signal Authentication.
Georg T. BeckerSherman C. LoDavid S. De LorenzoPer K. EngeChristof PaarPublished in: DBSec (2010)
Keyphrases
- key distribution
- security analysis
- authentication protocol
- high security
- cryptographic protocols
- private key
- public key
- user authentication
- security requirements
- smart card
- symmetric key
- authentication scheme
- image encryption
- key exchange
- mutual authentication
- security model
- security properties
- encryption scheme
- encryption algorithm
- elliptic curve cryptography
- conflict resolution
- mobile devices
- security protocols
- security mechanisms
- access control