2016
DOI: 10.5120/ijca2016910829
|View full text |Cite
|
Sign up to set email alerts
|

Investigation and Analysis of Location based Authentication and Security Services of Wireless LAN’s and Mobile Devices

Abstract: In the last two decades lot of research and development occurs on Location-Based Authentication and Security Services (LBASSs) which allow users to see where their friends are, to search location-tagged content within their local area networks, and to meet others nearby. Previously the data can be accessed from anywhere and any time. Hence lot of unexpected misjudgment were happened due to location independent authentication protocols. The recent availability of open mobile platforms, such as Apple iPhones and… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2017
2017
2019
2019

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 10 publications
0
3
0
Order By: Relevance
“…There are various information hiding approaches have been added to get security while using cryptography. 4. Least significant method [1] shows outstanding methodology upto 1990 year, after there are many researches survey discovered and survey a lot.…”
Section: 1 Pitfalls In Lsb Methodologymentioning
confidence: 99%
See 2 more Smart Citations
“…There are various information hiding approaches have been added to get security while using cryptography. 4. Least significant method [1] shows outstanding methodology upto 1990 year, after there are many researches survey discovered and survey a lot.…”
Section: 1 Pitfalls In Lsb Methodologymentioning
confidence: 99%
“…This paper investigates the various ideas [2][3][4][5][6][7][8] of hiding techniques and then analyses the most common forms multimedia content as a secret information kept in cover image, such as watermark, fingerprint. To assess the robustness of cover image even after hiding multimedia data as secret data using metrics of image quality concept [12].…”
Section: Proposed Methodology Using Hybrid Steganographymentioning
confidence: 99%
See 1 more Smart Citation