Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,715,824 papers from all fields of science
Search
Sign In
Create Free Account
Location-based authentication
Location-based authentication is a special procedure to prove an individual's identity and authenticity on appearance simply by detecting its…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
13 relations
Authentication
Context-based access control
Discretionary access control
Graph-based access control
Expand
Broader (1)
Computer access control
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
The simple location-based authentication method using multi-layer display in Korea
kwangjong ahn
,
June-Suh Cho
Journal of Business & Retail Management Research
2019
Corpus ID: 198356418
The importance of selecting an environment appropriate authentication method is the most crucial decision in designing secure…
Expand
2015
2015
System for location-based authentication using bluetooth low energy beacon
최민
2015
Corpus ID: 70212724
The invention is installed in a predetermined position or a place, BLE (Bluetooth Low Energy) communication based on a beacon…
Expand
2015
2015
A Location-based Authentication and Key Management Scheme for Border Surveillance Wireless Sensor Networks
W. Abdallah
,
N. Boudriga
2015
Corpus ID: 67716045
2015
2015
GPS Location-based Authentication (Kerberos as an example)
W. MahmoudK.
,
T. AbdelmajidN.
2015
Corpus ID: 62119165
Review
2014
Review
2014
End-to-End Authentication Protocols for Personal/Portable Devices over Cognitive Radio Networks
Hyunsung Kim
2014
Corpus ID: 30452009
Recent Federal Communications Commission rules promise a whole new set of possible applications, which allow unlicensed use on a…
Expand
2014
2014
Leveraging Smartphone Hardware Capabilities for Alternative Authentication
Isaac Long
2014
Corpus ID: 16433184
In this project, we explore two forms of user authentication, alternative to the alpha-numeric password, through utilization of…
Expand
2013
2013
Proving co-location by context comparison Seminar Report
Xiang Gao
2013
Corpus ID: 21861308
Due to practical demands, usability in security systems is reconsidered by researchers in recent years. Given the three…
Expand
2012
2012
Location-Based Authentication Mechanism for Server Access Control
J. Choi
,
Kwantae Cho
,
Dong Hoon Lee
2012
Corpus ID: 55191286
Recently, security incidents occur continuously, resulting in the leakages of a large amount of the company's confidential and…
Expand
2007
2007
Probabilistic Approach for Location-Based Authentication; 1st International Workshop on Security for Spontaneous, IWSSI 2007 co-located with Ubicomp 2007; ; UbiComp 2007
Mikko Lehtonen
,
F. Michahelles
,
E. Fleisch
2007
Corpus ID: 67039369
This paper explores location-based product authentication in a situation where only the past locations of products that flow in a…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE