A Location Based Encryption Technique and Some of Its Applications
Abstract
Location based encryption enhances security by
integrating position and time into encryption and
decryption processes. We find that from a security
perspective, it is not enough to simply enable or disable
decryption based on location and time; these aspects must
be integrated into the key construction process.
Furthermore, keys or files in transit should not reveal
anything regarding their locations/times of applicability.
After reviewing the objectives of location-based
encryption, this paper introduces a specific approach
called geo-encryption.
Description
Institute of Navigation National Technical Meeting 2003, January 22-24, 2003, Anaheim, CA, pp. 734-740.
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.Collections
Related items
Showing items related by title, author, creator and subject.
-
An analysis of two layers of encryption to protect network traffic
Ware, Ryan T. (Monterey, California. Naval Postgraduate School, 2010-06);In this thesis, we attempt to analyze the effectiveness of defense-in-depth mechanisms. As an example of defense-indepth, we study two layers of encryption to protect network traffic. At a quick glance, two layers of ... -
Short Message Service (SMS) security solution for mobile devices
Ng, Yu Loon. (Monterey, California. Naval Postgraduate School, 2006-12);This thesis focuses on the security of Short Message Service (SMS) and the Global System for Mobile communication (GSM) network and the use of encryption to protect SMS messages. A detailed study of the GSM network and ... -
Experimental studies of applications of time-reversal acoustics to non-coherent underwater communications
Heinemann, Michael Gerhard (Monterey, California. Naval Postgraduate School, 2000-03);The most difficult problem in shallow underwater acoustic communications is considered to be the time-varying multipath propagation because it impacts negatively on data rates. Computationally intensive and complex signal ...