Presentation | 2007-07-19 The Study for the Position Authentication and the Security of Location Information Yukio Takahashi, Shigeo Tsujii, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | The use of the location information such as walk-navigation by the mobile telephone and car navigations using the GPS spreads rapidly, and the location information notification when the emergency call is started. The location information becomes more important in daily life. The location information is private, and it is necessary to have a high security from the viewpoint of privacy. The security of location information and the positional authentication are so described as to provide the trust location information. One example of the procedure of the location information management is shown. Moreover, the positional authentication similar to the time authentication is presented so that it can utilize the system of the time authentication. Flexible correspondence is made for the user to select the reliability and privacy level. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | Location information / Position authentication / Privacy / Security / Time authentication |
Paper # | ISEC2007-16,SITE2007-10 |
Date of Issue |
Conference Information | |
Committee | SITE |
---|---|
Conference Date | 2007/7/12(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Social Implications of Technology and Information Ethics (SITE) |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | The Study for the Position Authentication and the Security of Location Information |
Sub Title (in English) | |
Keyword(1) | Location information |
Keyword(2) | Position authentication |
Keyword(3) | Privacy |
Keyword(4) | Security |
Keyword(5) | Time authentication |
1st Author's Name | Yukio Takahashi |
1st Author's Affiliation | Institute of Information Security:National Institute of Information and Communication Technology() |
2nd Author's Name | Shigeo Tsujii |
2nd Author's Affiliation | Institute of Information Security |
Date | 2007-07-19 |
Paper # | ISEC2007-16,SITE2007-10 |
Volume (vol) | vol.107 |
Number (no) | 139 |
Page | pp.pp.- |
#Pages | 6 |
Date of Issue |