Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Location-based authentication

Location-based authentication is a special procedure to prove an individual's identity and authenticity on appearance simply by detecting its… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
The concept of Internet of things (IoT) has attracted attention as a key technology for realizing future industrial society. In… Expand
  • figure 1
  • figure 2
  • table I
  • figure 3
  • figure 4
Is this relevant?
2016
2016
User location can act as an additional factor of authentication in scenarios where physical presence is required, such as when… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Is this relevant?
2015
2015
In this paper, we propose and evaluate the combination of location-based authentication with security questions as a more usable… Expand
  • figure 1
  • table 1
  • table 2
  • figure 2
  • table 3
Is this relevant?
2014
2014
This paper investigates a location-based authentication system where authentication questions are generated based on users… Expand
  • table I
  • table II
  • table III
Is this relevant?
2012
2012
Authentication and authorization are two of the most important security features for mobile transaction systems. Most commonly… Expand
  • figure 1
  • figure 2
  • figure 4
  • figure 5
  • figure 6
Is this relevant?
2010
2010
In this paper, new space-time authentication techniques are proposed. Location-based authentication is a new direction in… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2010
2010
The increase in the number of counterfeits penetrating into the open market has created the need for a product authentication… Expand
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Product authentication is needed to detect counterfeit products and to prevent them from entering the distribution channels of… Expand
  • figure 1
  • figure 2
  • figure 3
  • table I
  • table II
Is this relevant?
2007
2007
This paper explores location-based product authentication in a situation where only the past locations of products that flow in a… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1996
Highly Cited
1996
Cyberspace is often characterized as a virtual world that transcends space. People log into computers and transact business… Expand
Is this relevant?