Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,409,477 papers from all fields of science
Search
Sign In
Create Free Account
Location-based authentication
Location-based authentication is a special procedure to prove an individual's identity and authenticity on appearance simply by detecting its…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
13 relations
Authentication
Context-based access control
Discretionary access control
Graph-based access control
Expand
Broader (1)
Computer access control
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
Provenance Location-based Authentication in Cloud Computing
Phornsawan Roemsri
,
R. Hewett
International Conference on Advances in…
2020
Corpus ID: 220323518
Cloud computing will continue flourishing. Like any technology that is widely used and advancing with many benefits, it also…
Expand
2020
2020
Unobtrusive Location-based Access Control Utilizing Existing IEEE 802.11 Infrastructure
Hosam Alamleh
,
J. Gourd
IEEE Microwave Theory and Techniques in Wireless…
2020
Corpus ID: 196196114
Mobile devices can sense several types of signals over the air using different radio frequency technologies (e.g., Wi-Fi…
Expand
Review
2019
Review
2019
Location based Authentication Service using 4G/5G Devices
Farhan Nisar
ComTech
2019
Corpus ID: 195221793
Mobile devices 4G/5G have become an important part of our day to day lives. Accessing internet applications has become much…
Expand
2017
2017
Effectively Collecting Data for the Location-Based Authentication in Internet of Things
Y. Kawamoto
,
Hiroki Nishiyama
,
N. Kato
,
Y. Shimizu
,
A. Takahara
,
Tingting Jiang
IEEE Systems Journal
2017
Corpus ID: 35518303
The concept of Internet of things (IoT) has attracted attention as a key technology for realizing future industrial society. In…
Expand
2015
2015
Designing challenge questions for location‐based authentication systems: a real‐life study
Yusuf Albayram
,
Mohammad Maifi Hasan Khan
,
Athanasios Bamis
,
Sotiris Kentros
,
Nhan Nguyen
,
Ruhua Jiang
Human-Centric Computing and Information Sciences
2015
Corpus ID: 16229338
Online service providers often use challenge questions (a.k.a. knowledge‐based authentication) to facilitate resetting of…
Expand
2013
2013
Easy attendance: location-based authentication for students integrated with moodle
M. Bucicoiu
,
N. Tapus
11th RoEduNet International Conference
2013
Corpus ID: 40175526
Nowadays, the e-learning platforms have become intensively used. Most schools and universities use a register in order to keep…
Expand
2011
2011
The Location-based Authentication with The Active Infrastructure
D. Jaroš
,
R. Kuchta
,
R. Vrba
International Conference on Internet and Web…
2011
Corpus ID: 64713833
- The paper introduces location-based authentication techniques that are especially addressed to use in buildings and the…
Expand
2010
2010
New Location-Based Authentication Techniques in the Access Management
D. Jaroš
,
R. Kuchta
International Conference on Wireless and Mobile…
2010
Corpus ID: 30470807
In this paper, new space-time authentication techniques are proposed. Location-based authentication is a new direction in…
Expand
2009
2009
A Location-Based Mechanism for Mobile Device Security
W. Jansen
,
Vlad Korolev
WRI World Congress on Computer Science and…
2009
Corpus ID: 7640416
While mobile handheld devices, such as cell phones and PDAs, provide productivity benefits, they also pose new risks. A vital…
Expand
2007
2007
Probabilistic Approach for Location-Based Authentication; 1st International Workshop on Security for Spontaneous, IWSSI 2007 co-located with Ubicomp 2007; ; UbiComp 2007
Mikko Lehtonen
,
F. Michahelles
,
E. Fleisch
2007
Corpus ID: 67039369
This paper explores location-based product authentication in a situation where only the past locations of products that flow in a…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE