Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/288090.288121acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article
Free access

How to prove where you are: tracking the location of customer equipment

Published: 01 November 1998 Publication History
First page of PDF

References

[1]
R. Anderson and M. Kuhn. Low cost attacks on tamper resistant devices. In 5th Security Protocols Workshop, LNCS 1361, pages 125-136, Paris, France, April 1997. Springer-Verlag.
[2]
Automatic Number Identification (.4NI) and Operator Number Identification (ONI), FSD 20-20- 0000, LATA Switching Systems Generic Requirements (LSSGR), Bellcore Technical Reference TR-NWT- 000682, Issue 2, March 1991.
[3]
B. Brewin. Rogue transmitter knocks out GPS signals. Federal Computer Week, April 13 1998. http://w~r~.fcw.comlpubs/fcw/199810413/ f cg-frontgp s-4-13-1998, html.
[4]
P.J. Britt. Return path simplified: Wireless modem jacks save cable TV installation time. Telephony, 234(7):14, February 1998.
[5]
I. Brodsky. Will they fly or crash 'n' burn? Telephony, pages 34-42, April 27 1998.
[6]
CLASS Feature: Calling Number Delivery, FSD 01- 02-1051, LATA Switching Systems Generic Requirements (LSSGR), Bellcore Technical Reference TR- NWT-000031, Issue 4, December 1992.
[7]
P.H. Dana. Global positioning system overview. The Geographer's Craft Project, Department of Geography, The University of Texas at Austin, 1998. http: //w~. utexas, edu/dept s/Erg/gcraft/not e s }Eps / gps. html.
[8]
The high-tech behind broadcasting DirecTV. DirecTV Inc., 2230 E. Imperial Highway, E1 Segundo, CA 90245, USA. http://w.r~.directv.com/ hardware/tech.html, 1998.
[9]
Report and order and further notice of proposed rulemaking in the matter of revision of the commission's rules to ensure compatibility with enhanced 911 emergency calling systems. FCC Docket No. 94-102, June 1996. Federal Communications Commission, 1919 M Street N.W., Washington DC 20554, USA.
[10]
T.T. Ha. Digital Satellite Communications. McGraw-Hill, second edition, 1990.
[11]
ITU- BO.121h Digital multi-programme emission systems for television, sound and data services for satellites operating in the 11/12 GHz frequency range. International Telecommunications Union, 1995.
[12]
J. McCormac. European Scrambling Systems 5. Waterford University Press, Waterford, Ireland, 1996.
[13]
M. J. Meyer, T. Jacobson, M. E. Palamara, E. A. Kidwell, R. E. Richton, and G. Vannucei. Wireless enhanced 9-1-1 service--making it a reality. Bell Labs Technical Journal, pages 188--202, Autumn 1996.
[14]
B.M. Macq and J.-J. Quisquater. Cryptology for digital TV broadcasting. Precedings of the 1EEE, 83(6):944-957, 1995.
[15]
A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone. Handbook of Applied Cryptography. CRC Press, Boca Raton, Florida, 1996.
[16]
Report on the New Jersey wireless enhanced 9- 1-1 system trial January 22 to April 30, 1997: The first 100 days. State of New Jersey Department of Law and Public Safety; Division of State Police, June 1997. Also available at http: //wwa. trueposition, com/pres sclip6, ht~L
[17]
ORBCOMM Corporation, 21700 Atlantic Blvd., Dulles, VA 20166-6801, USA. See also: ORBCOMM system description, http://w~, orbcomm, corn/about/ sysdesc .html.
[18]
[email protected] (AIMS / Intel-Info). Two known GPS jamming cases. RISKS Forum Digest, vol. 19, no. 74, May 1998. USENET comp.risks, Peter G. Neumann, moderator, Computer Science Lab, SRI International, Menlo Park CA 94025 USA. Archived at http:/leafless .ncl.ac .uk/ Risks/19.74.html and ftp:/lunix.sri.com/risksl risks-19.74.
[19]
O. Schmidt. GPS-jarnmers too good for their own good. Intelligence, 76(6), 1998.

Cited By

View all
  • (2021)MobChain: Three-Way Collusion Resistance in Witness-Oriented Location Proof Systems Using Distributed ConsensusSensors10.3390/s2115509621:15(5096)Online publication date: 28-Jul-2021
  • (2020)Location Proof Systems for Smart Internet of Things: Requirements, Taxonomy, and Comparative AnalysisElectronics10.3390/electronics91117769:11(1776)Online publication date: 26-Oct-2020
  • (2016)WORALIEEE Transactions on Emerging Topics in Computing10.1109/TETC.2015.24013944:1(128-141)Online publication date: 1-Jan-2016
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
CCS '98: Proceedings of the 5th ACM conference on Computer and communications security
November 1998
160 pages
ISBN:1581130074
DOI:10.1145/288090
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 November 1998

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Conference

5CCS98
Sponsor:
5CCS98: 5th ACM Conference on Computer and Communication Security
November 2 - 5, 1998
California, San Francisco, USA

Acceptance Rates

Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)80
  • Downloads (Last 6 weeks)17
Reflects downloads up to 25 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2021)MobChain: Three-Way Collusion Resistance in Witness-Oriented Location Proof Systems Using Distributed ConsensusSensors10.3390/s2115509621:15(5096)Online publication date: 28-Jul-2021
  • (2020)Location Proof Systems for Smart Internet of Things: Requirements, Taxonomy, and Comparative AnalysisElectronics10.3390/electronics91117769:11(1776)Online publication date: 26-Oct-2020
  • (2016)WORALIEEE Transactions on Emerging Topics in Computing10.1109/TETC.2015.24013944:1(128-141)Online publication date: 1-Jan-2016
  • (2014)OTITProceedings of the 9th ACM symposium on Information, computer and communications security10.1145/2590296.2590339(87-98)Online publication date: 4-Jun-2014
  • (2014)'Who, When, and Where?' Location Proof Assertion for Mobile DevicesProceedings of the 28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy XXVIII - Volume 856610.1007/978-3-662-43936-4_10(146-162)Online publication date: 14-Jul-2014
  • (2013)Modeling a secure supply chain integrity preservation system2013 IEEE International Conference on Technologies for Homeland Security (HST)10.1109/THS.2013.6699096(741-747)Online publication date: Nov-2013
  • (2009)A Study of User-Friendly Hash Comparison SchemesProceedings of the 2009 Annual Computer Security Applications Conference10.1109/ACSAC.2009.20(105-114)Online publication date: 7-Dec-2009
  • (2008)Location constraints in digital rights managementComputer Communications10.1016/j.comcom.2008.01.00831:6(1173-1180)Online publication date: 1-Apr-2008
  • (2008)A robust localization algorithm in wireless sensor networksFrontiers of Computer Science in China10.1007/s11704-008-0018-72:4(438-450)Online publication date: 30-Jul-2008
  • (2006)Secure Location Verification Using Radio BroadcastIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2006.573:4(377-385)Online publication date: 1-Oct-2006
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media