Location-based authentication and authorization using smart phones
2012 (English)In: Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012, IEEE , 2012, 1285-1292 p.Conference paper (Refereed)
Authentication and authorization are two of the most important security features for mobile transaction systems. Most commonly, these schemes depend on three factors: what you know (secret), what you have (token), and what you are (biometrics). In this paper, we propose a location-based authentication and authorization scheme for mobile transactions using smart phones. The paper first describes the distinguished features and the architecture of our proposed solution. Second, the core of our design, including three parts: location registration, authentication and authorization as well as location verification, are described.
Place, publisher, year, edition, pages
IEEE , 2012. 1285-1292 p.
authentication, authorization, location, mobile
IdentifiersURN: urn:nbn:se:kth:diva-107220DOI: 10.1109/TrustCom.2012.198ScopusID: 2-s2.0-84868115333ISBN: 978-076954745-9OAI: oai:DiVA.org:kth-107220DiVA: diva2:576463
11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012, 25 June 2012 through 27 June 2012, Liverpool
QC 201212142012-12-132012-12-102013-03-25Bibliographically approved