Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Experiences of developing and deploying a context-aware tourist guide: the GUIDE project
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Location Privacy in Pervasive Computing
IEEE Pervasive Computing
Efficient Identity Based Signature Schemes Based on Pairings
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
PILGRIM: A Location Broker and Mobility-Aware Recommendation System
PERCOM '03 Proceedings of the First IEEE International Conference on Pervasive Computing and Communications
An Active Transcoding Proxy to Support Mobile Web Access
SRDS '98 Proceedings of the The 17th IEEE Symposium on Reliable Distributed Systems
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
Secure pseudonym management using mediated identity-based encryption
Journal of Computer Security - The First ACM Workshop on Digital Identity Management -- DIM 2005
Hi-index | 0.00 |
In this paper we describe an architecture that supports the secure operation of Location Based Services (LBSs) over the Internet. In particular, we describe a three-party protocol that is used to mutually identify and authenticate users, LBSs, and a trusted middleware infrastructure that is responsible for managing the users' identity and location information. This authentication protocol is based upon the X.509 two-way authentication protocol and a mediated identity based cryptography system, and it enables users to identify and authenticate themselves to the infrastructure using their real identities. In order to preserve the users' privacy, they can identify and authenticate themselves to the LBSs using pseudonyms. This protocol can be subsequently used to exchange messages containing location information, and the confidentiality, integrity, and non-repudiation of these messages can be demonstrated.