• Corpus ID: 10674249

The Technological Hybrid of Geofencing Engineering

@inproceedings{IjehTheTH,
  title={The Technological Hybrid of Geofencing Engineering},
  author={C. Ijeh and David S. Preston and Chris Imafidon and Titus. B. Watmon and Annette. O. Uwaechie and M. B. Cooke and Peter Lancaster and Andy Widdess}
}
—The focus of this paper is a review of a unique hybrid security concept which provides an intervention to a real world problem; the intervention provides security to the medium for wireless networks as a result of leakage which occurs when radio magnetic waves are used by wireless networks to carry data. The findings of our review showed that the hybrid security concept can be used to provide the intervention once crafted in an appropriate manner. The variables obtained from the review done in… 

Figures and Tables from this paper

References

SHOWING 1-10 OF 15 REFERENCES

Evaluating location based privacy in wireless networks

TLDR
This paper aims to review contemporary issues on location based privacy in wireless technology and proposes a model for optimising LBS privacy and describes the initial stages of a research project aimed at filling the research void through the application of a hybrid research methodology.

Location-Based Services and Geo-Information Engineering

Mastering GIS Series: Foreword Preface 1 The Context of Location-Based Services 1.1 Introduction 1.2 The Information Society 1.3 The Digital City 1.4 The New Mobility 1.5 Outline of Following

Analyzing the Past to Prepare for the Future: Writing a Literature Review

TLDR
A review of prior, relevant literature is an essential feature of any academic project that facilitates theory development, closes areas where a plethora of research exists, and uncovers areas where research is needed.

―Using Geofencing to Overcome Security Challenges in Wireless Networks: Proof of Concept‖ In proceedings of the Information Society 12th international multi-conference 12

  • ―Using Geofencing to Overcome Security Challenges in Wireless Networks: Proof of Concept‖ In proceedings of the Information Society 12th international multi-conference 12
  • 2009

Significance of Security in transmitting clinical data‖ ICGS3'09 (formerly ICGeS) Conference Proceedings 1st to the 2nd of September 2009 www

  • Significance of Security in transmitting clinical data‖ ICGS3'09 (formerly ICGeS) Conference Proceedings 1st to the 2nd of September 2009 www
  • 2009

―User preferences, information transactions and location-based services: A study of urban pedestrian way finding‖ in Computers

  • Elsevier
  • 2005

Security Strategy Model‖ ICGS3'09 (formerly ICGeS) Conference Proceedings 1st to the 2nd of September 2009 www

  • Security Strategy Model‖ ICGS3'09 (formerly ICGeS) Conference Proceedings 1st to the 2nd of September 2009 www
  • 2009

Systematic Determination of Quantitative Usability Requirements

  • To be published in the proceedings of HCI International
  • 2003

Way finding by people with visual impairments: The effect of spatial tasks on the ability to learn a novel route

  • Journal of Visual Impairment and Blindness
  • 2002

―Evaluating Ethical and Productivity Issues in Geofencing‖ Symposium on progress in Information and Communication Technologies 7-8 December

  • ―Evaluating Ethical and Productivity Issues in Geofencing‖ Symposium on progress in Information and Communication Technologies 7-8 December
  • 2009