2012 IEEE International Conference on Pervasive Computing and Communications Workshops 2012
DOI: 10.1109/percomw.2012.6197514
|View full text |Cite
|
Sign up to set email alerts
|

Location privacy via actively secure private proximity testing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 28 publications
(28 citation statements)
references
References 12 publications
0
11
0
Order By: Relevance
“…The solutions proposed for producing a discrete version of continuous domains have the goal of making data suitable to machine learning and/or data mining applications, of supporting proximity tests, or of anonymizing pseudonyms (e.g., [6,9,11,14]). These solutions are therefore not suited to the scenario considered in this paper.…”
Section: Related Workmentioning
confidence: 99%
“…The solutions proposed for producing a discrete version of continuous domains have the goal of making data suitable to machine learning and/or data mining applications, of supporting proximity tests, or of anonymizing pseudonyms (e.g., [6,9,11,14]). These solutions are therefore not suited to the scenario considered in this paper.…”
Section: Related Workmentioning
confidence: 99%
“…As mentioned in Section I, in this paper, we focus on the data collection of environmental signals as ambient information of users to construct the list of the ambient information, which is utilized for more secure authentication systems [5], [6]. In [5], [6], as the ambient information, some elements such as Service Set IDentifier (SSID), Received Signal Strength (RSS), Sequence Numbers (SN) and Media Access Control (MAC) addresses of the packets are introduced.…”
Section: A Assumed Network Modelmentioning
confidence: 99%
“…In [5], [6], as the ambient information, some elements such as Service Set IDentifier (SSID), Received Signal Strength (RSS), Sequence Numbers (SN) and Media Access Control (MAC) addresses of the packets are introduced. As shown in Fig.…”
Section: A Assumed Network Modelmentioning
confidence: 99%
“…Location tags and proximity tests are also used in [19], as a way of providing local authentication, while [47] presents a secure handshake for communication between the two actors in proximity. The security of the basic proximity testing protocol has been further improved in [31]. In [43], Tonicelli et al propose a solution for proximity testing based on pre-distributed data, secure in the Universal Composability framework.…”
Section: Introductionmentioning
confidence: 99%