This paper identifies a number of critical infrastructure applications that are reliant on location services from cooperative location technologies such as GPS and GSM. We show that these location technologies can be represented in a general location model, such that the model components can be used for vulnerability analysis. We perform a vulnerability analysis on these components of GSM and GPS location systems as well as a number of augmentations to these systems
Control, trust, privacy, and security: evaluating location-based services Location-based services (L...
LBS (Location-based Services) are ubiquitous nowadays; they are used by a wide variety of applicatio...
Due to the development of global navigation satellite systems (GNSS), people are able to obtain thei...
This paper introduces location-based security services and discusses a new model for tamper-resistan...
The development of low-cost, ubiquitous, wireless systems is leading to a future where location will...
Context-aware computing has been a rapidly growing research area, however its uses have been predomi...
NoSecurity is a function of the trust that is associated with the active variables in a system. Thus...
This thesis presents a Wireless Security Model (WSM) to the security risks caused by the leakage of ...
This paper introduces location-based security services and discusses a new model for tamper-resistan...
The paper presents the construction of a locator to determine locations using GSM technology. The lo...
This publication describes systems and techniques directed to managing access to location informatio...
Security has become one of the most important fea tures in modern computation, especially due to the...
This work deals with the construction of a locator to determine locations using GSM technology. The ...
The paper describes a number of requirements for enhancing the trust of location acquisition from Sa...
In the cyberterrorism concept, whoever was the type of terrorist group: Religious, Ethno-nationalist...
Control, trust, privacy, and security: evaluating location-based services Location-based services (L...
LBS (Location-based Services) are ubiquitous nowadays; they are used by a wide variety of applicatio...
Due to the development of global navigation satellite systems (GNSS), people are able to obtain thei...
This paper introduces location-based security services and discusses a new model for tamper-resistan...
The development of low-cost, ubiquitous, wireless systems is leading to a future where location will...
Context-aware computing has been a rapidly growing research area, however its uses have been predomi...
NoSecurity is a function of the trust that is associated with the active variables in a system. Thus...
This thesis presents a Wireless Security Model (WSM) to the security risks caused by the leakage of ...
This paper introduces location-based security services and discusses a new model for tamper-resistan...
The paper presents the construction of a locator to determine locations using GSM technology. The lo...
This publication describes systems and techniques directed to managing access to location informatio...
Security has become one of the most important fea tures in modern computation, especially due to the...
This work deals with the construction of a locator to determine locations using GSM technology. The ...
The paper describes a number of requirements for enhancing the trust of location acquisition from Sa...
In the cyberterrorism concept, whoever was the type of terrorist group: Religious, Ethno-nationalist...
Control, trust, privacy, and security: evaluating location-based services Location-based services (L...
LBS (Location-based Services) are ubiquitous nowadays; they are used by a wide variety of applicatio...
Due to the development of global navigation satellite systems (GNSS), people are able to obtain thei...