Location-based authentication

Location-based authentication is a special procedure to prove an individual's identity and authenticity on appearance simply by detecting its… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

2007-2017
02420072017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
The concept of Internet of things (IoT) has attracted attention as a key technology for realizing future industrial society. In… (More)
  • figure 1
  • figure 2
  • table I
  • figure 3
  • figure 4
Is this relevant?
2015
2015
In this paper, we propose and evaluate the combination of location-based authentication with security questions as a more usable… (More)
  • figure 1
  • table 1
  • table 2
  • figure 2
  • table 3
Is this relevant?
2014
2014
This paper investigates a location-based authentication system where authentication questions are generated based on users… (More)
  • table I
  • table II
  • table III
Is this relevant?
2013
2013
Nowadays, the e-learning platforms have become intensively used. Most schools and universities use a register in order to keep… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2013
2013
The increasing spread of location-based services (LBSs) has led to a renewed research interest in the security of services. To… (More)
  • table 1
  • figure 1
  • table 2
  • figure 2
  • figure 3
Is this relevant?
2012
2012
Authentication and authorization are two of the most important security features for mobile transaction systems. Most commonly… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 5
  • figure 6
Is this relevant?
2011
2011
The developing IEEE 802.22 standard will allow broadband access to be provided in sparsely populated areas by using cognitive… (More)
Is this relevant?
2010
2010
In this paper, new space-time authentication techniques are proposed. Location-based authentication is a new direction in… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2007
2007
This paper explores location-based product authentication in a situation where only the past locations of products that flow in a… (More)
  • figure 2
  • figure 1
  • figure 3
  • figure 4
  • table 1
Is this relevant?
2007
2007
Product authentication is needed to detect counterfeit products and to prevent them from entering the distribution channels of… (More)
  • figure 1
  • figure 2
  • figure 3
  • table I
  • table II
Is this relevant?