Performance of Computer Communication Systems: A Model-Based Approach
Performance of Computer Communication Systems: A Model-Based Approach
Towards the Integration of Web Services Security on Enterprise Environments
SAINT-W '02 Proceedings of the 2002 Symposium on Applications and the Internet (SAINT) Workshops
Certificate revocation and certificate update
IEEE Journal on Selected Areas in Communications
Multilateral approaches to the mobile RFID security problem using web service
APWeb'08 Proceedings of the 10th Asia-Pacific web conference on Progress in WWW research and development
Secure UHF/HF dual-band RFID: strategic framework approaches and application solutions
ICCCI'11 Proceedings of the Third international conference on Computational collective intelligence: technologies and applications - Volume Part I
Security techniques based on EPC gen2 tag for secure mobile RFID network services
KES'06 Proceedings of the 10th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part I
FGIT'11 Proceedings of the Third international conference on Future Generation Information Technology
Secure RFID personal data management using privacy reference profile
FGIT'11 Proceedings of the Third international conference on Future Generation Information Technology
Information technology security evaluation using CERT c secure coding standard
FGIT'11 Proceedings of the Third international conference on Future Generation Information Technology
USN middleware access control of sensor network and selective encryption of information
FGIT'11 Proceedings of the Third international conference on Future Generation Information Technology
Hi-index | 0.00 |
Location-based services or LBS refers to value-added service by processing information utilizing mobile user location. For this kind of LBS, the role of security service is very important in the LBS that store and manage the location information of mobile devices and support various application services using those location information. And in all phases of these functions that include acquisition of location information, storage and management of location information, user management including authentication and information security, and management of the large-capacity location information database, safe security service must be provided. We show the security methods for open LBS in this paper.