2011 17th IEEE International Conference on Networks 2011
DOI: 10.1109/icon.2011.6168482
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing security and confidentiality on mobile devices by location-based data encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0
1

Year Published

2014
2014
2020
2020

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 5 publications
0
6
0
1
Order By: Relevance
“…Therefore, risk levels can be associated with where the data are stored and processed, and several studies take location into account when proposing security solutions. Encryption and access‐control services were proposed to tackle location‐based security decisions . However, they do not tackle the placement of security‐enabled streaming components w.r.t.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Therefore, risk levels can be associated with where the data are stored and processed, and several studies take location into account when proposing security solutions. Encryption and access‐control services were proposed to tackle location‐based security decisions . However, they do not tackle the placement of security‐enabled streaming components w.r.t.…”
Section: Related Workmentioning
confidence: 99%
“…Encryption and access-control services were proposed to tackle location-based security decisions. [19][20][21] However, they do not tackle the placement of security-enabled streaming components w.r.t. data location and associated risks.…”
Section: Location-aware Security Policiesmentioning
confidence: 99%
“…al [22] presented a geoencryption protocol which allows the mobile nodes to communicate with each other by restriction when decoding a message in the specific location and time period. Similar technique was applied for mobile devices in [23].…”
Section: Related Workmentioning
confidence: 99%
“…Geotag value is used to generate geo-secured key from session key and recover session key from geo-secured key. Model takes advantage of GPS technology and it's suitable for mobile device, which has low-computation capability and short battery life [1]. The strongest of key depends on the current receiver's location and DTD.…”
Section: Surveymentioning
confidence: 99%
“…This paper, try to present a modified geo-encryption protocol and improve its efficiency. Furthermore consider all types of possible attacks to the Geo protocol and propose some solutions to deal with them [1].…”
Section: Surveymentioning
confidence: 99%