Proceedings of the 10th Workshop on Mobile Computing Systems and Applications 2009
DOI: 10.1145/1514411.1514414
|View full text |Cite
|
Sign up to set email alerts
|

Enabling new mobile applications with location proofs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
128
0
1

Year Published

2011
2011
2019
2019

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 181 publications
(129 citation statements)
references
References 9 publications
0
128
0
1
Order By: Relevance
“…The AP-based approaches [30], [31] have been widely used for LBSs in mobile environments. In our approach, a user can send queries anytime and anywhere, and the query is generated in the format of (x, y), I, r, others , where (x, y) represents the exact location of the user, I represents the queried interest, r is the queried range and others include the user's identity, etc.…”
Section: Implementation Issuesmentioning
confidence: 99%
“…The AP-based approaches [30], [31] have been widely used for LBSs in mobile environments. In our approach, a user can send queries anytime and anywhere, and the query is generated in the format of (x, y), I, r, others , where (x, y) represents the exact location of the user, I represents the queried interest, r is the queried range and others include the user's identity, etc.…”
Section: Implementation Issuesmentioning
confidence: 99%
“…A similar higher level primitive is location proofs, introduced by Saroiu et al [42]. In a typical usage scenario, a mobile device, seeking to prove its location may request a component of the local wireless infrastructure (such as a WiFi access point or a cell phone tower) to issue it a location proof.…”
Section: Discussionmentioning
confidence: 99%
“…In [132], a secure location proof is proposed for mobile users' location privacy. In this approach, mobile users and wireless Access Points (APs) exchange their public keys which have been signed.…”
Section: ) Caching Schemes In Mobile Networkmentioning
confidence: 99%