The official PGP user's guide
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Practical robust localization over large-scale 802.11 wireless networks
Proceedings of the 10th annual international conference on Mobile computing and networking
The Zombie roundup: understanding, detecting, and disrupting botnets
SRUTI'05 Proceedings of the Steps to Reducing Unwanted Traffic on the Internet on Steps to Reducing Unwanted Traffic on the Internet Workshop
Digital Watermarking and Steganography
Digital Watermarking and Steganography
Accurate GSM indoor localization
UbiComp'05 Proceedings of the 7th international conference on Ubiquitous Computing
IEEE Communications Magazine
Data hiding in image and video .I. Fundamental issues and solutions
IEEE Transactions on Image Processing
Data hiding in image and video .II. Designs and applications
IEEE Transactions on Image Processing
Enabling new mobile applications with location proofs
Proceedings of the 10th workshop on Mobile Computing Systems and Applications
SMILE: encounter-based trust for mobile social services
Proceedings of the 16th ACM conference on Computer and communications security
Proving your location without giving up your privacy
Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications
Toward trustworthy mobile sensing
Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications
I am a sensor, and I approve this message
Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications
VeriPlace: a privacy-aware location proof architecture
Proceedings of the 18th SIGSPATIAL International Conference on Advances in Geographic Information Systems
SignalGuru: leveraging mobile phones for collaborative traffic signal schedule advisory
MobiSys '11 Proceedings of the 9th international conference on Mobile systems, applications, and services
Quality control for real-time ubiquitous crowdsourcing
Proceedings of the 2nd international workshop on Ubiquitous crowdsouring
YouProve: authenticity and fidelity in mobile sensing
Proceedings of the 9th ACM Conference on Embedded Networked Sensor Systems
Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures
Journal of Network and Computer Applications
Software abstractions for trusted sensors
Proceedings of the 10th international conference on Mobile systems, applications, and services
Prosumerization of Mobile Service Provision: A Conceptual Approach
International Journal of Web Portals
Ubiquitous recommender systems
Computing
Hi-index | 0.00 |
The recent explosion in shared media content and sensed data produced by mobile end-users is challenging well-established principles and assumptions in data trust models. A fundamental issue we address in this paper is how to establish some trust level in the authenticity of content created by untrusted mobile users. We advocate a secure localization and certification service that allows content producers to tag their content with with a spatial times-tamp indicating its physical location. At the same time, however, our approach preserves the privacy of producers by not exposing their identity to the potential content consumers. We provide a list of existing and possible applications that would profit from such a secure localization service and sketch possible implementations of the service, highlighting advantages and drawbacks.