Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Location-based authentication and authorization using smart phones
KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS.
KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS.ORCID iD: 0000-0002-7734-7817
KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS.
2012 (English)In: Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012, IEEE , 2012, 1285-1292 p.Conference paper, Published paper (Refereed)
Abstract [en]

Authentication and authorization are two of the most important security features for mobile transaction systems. Most commonly, these schemes depend on three factors: what you know (secret), what you have (token), and what you are (biometrics). In this paper, we propose a location-based authentication and authorization scheme for mobile transactions using smart phones. The paper first describes the distinguished features and the architecture of our proposed solution. Second, the core of our design, including three parts: location registration, authentication and authorization as well as location verification, are described.

Place, publisher, year, edition, pages
IEEE , 2012. 1285-1292 p.
Keyword [en]
authentication, authorization, location, mobile
National Category
Communication Systems
Identifiers
URN: urn:nbn:se:kth:diva-107220DOI: 10.1109/TrustCom.2012.198Scopus ID: 2-s2.0-84868115333ISBN: 978-076954745-9 (print)OAI: oai:DiVA.org:kth-107220DiVA: diva2:576463
Conference
11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012, 25 June 2012 through 27 June 2012, Liverpool
Note

QC 20121214

Available from: 2012-12-13 Created: 2012-12-10 Last updated: 2013-03-25Bibliographically approved

Open Access in DiVA

Location-based Authentication and Authorization Using Smart Phones(326 kB)2101 downloads
File information
File name FULLTEXT01.pdfFile size 326 kBChecksum SHA-512
ef19a2fe544866015bf9555d6e5228ba7c8c057d0aa2a6d85a0f9b1d261c125735a50e12db3b43e7b245cbfc60f7c6796bd0240800c12ce56e1a89d4a4045983
Type fulltextMimetype application/pdf

Other links

Publisher's full textScopusIEEEXplore

Search in DiVA

By author/editor
Zhang, FengKondoro, AronMuftic, Sead
By organisation
Communication Systems, CoS
Communication Systems

Search outside of DiVA

GoogleGoogle Scholar
Total: 2101 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 134 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf