A Location Based Encryption Technique and Some of Its Applications
dc.contributor.author | Scott, Logan | |
dc.contributor.author | Denning, Dorothy E. | |
dc.date | 2003-01 | |
dc.date.accessioned | 2013-11-06T21:10:34Z | |
dc.date.available | 2013-11-06T21:10:34Z | |
dc.date.issued | 2003-01 | |
dc.identifier.citation | Scott, L. and Denning, D. E., Location Based Encryption Technique and Some of Its Applications, Institute of Navigation National Technical Meeting 2003, January 22-24, 2003, Anaheim, CA, pp. 734-740. (.pdf) | |
dc.identifier.uri | https://hdl.handle.net/10945/37173 | |
dc.description | Institute of Navigation National Technical Meeting 2003, January 22-24, 2003, Anaheim, CA, pp. 734-740. | en_US |
dc.description.abstract | Location based encryption enhances security by integrating position and time into encryption and decryption processes. We find that from a security perspective, it is not enough to simply enable or disable decryption based on location and time; these aspects must be integrated into the key construction process. Furthermore, keys or files in transit should not reveal anything regarding their locations/times of applicability. After reviewing the objectives of location-based encryption, this paper introduces a specific approach called geo-encryption. | en_US |
dc.rights | This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States. | en_US |
dc.title | A Location Based Encryption Technique and Some of Its Applications | en_US |
dc.type | Article | en_US |
dc.contributor.department | Defense Analysis (DA) |