Privacy-preserving content dissemination for vehicular social networks: Challenges and solutions

X Wang, Z Ning, MC Zhou, X Hu… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Vehicular social networks (VSNs), viewed as the integration of traditional vehicular networks
and social networks, are promising communication platforms based on the development of …

Towards dependably detecting geolocation of cloud servers

L Hippelainen, I Oliver, S Lal - … , NSS 2017, Helsinki, Finland, August 21 …, 2017 - Springer
Every physical data center is located somewhere on the globe. A cloud service can be
delivered from a set of data centers in several locations, depending on their workload …

[HTML][HTML] SAM-PAY: A Location-Based Authentication Method for Mobile Environments

DG Berbecaru - Electronics, 2025 - mdpi.com
Wireless, satellite, and mobile networks are increasingly used in application scenarios to
provide advanced services to mobile or nomadic devices. For example, to authenticate …

Server location verification (SLV) and server location pinning: Augmenting TLS authentication

AR Abdou, PCV Oorschot - ACM Transactions on Privacy and Security …, 2017 - dl.acm.org
We introduce the first known mechanism providing realtime server location verification. Its
uses include enhancing server authentication by enabling browsers to automatically …

Towards sustainable evolution for the TLS public-key infrastructure

T Lee, C Pappas, P Szalachowski… - Proceedings of the 2018 on …, 2018 - dl.acm.org
Motivated by the weaknesses of today's TLS public-key infrastructure (PKI), recent studies
have proposed numerous enhancements to fortify the PKI ecosystem. Deploying one …

An Innovative Authentication Model for the Enhancement of Cloud Security

FK Mupila, H Gupta - Innovations in Computer Science and Engineering …, 2021 - Springer
Cloud computing provides different types of services deployed in different models; thus, its
security has become a paramount concern in the IT field. In this paper, a conceptual …

Survey of cloud server geolocating techniques

L Hippelainen, I Oliver, S Lai - 2016 19th Conference of Open …, 2016 - ieeexplore.ieee.org
Every cloud data center has a geographical location, which is known to, at least, its owner.
Still, it is a challenge for a cloud customer to discover indisputably the location of the data …

EVLA: Extended-Validation Certificates with Location Assurance

P Szalachowski - Proceedings of the 2019 ACM International …, 2019 - dl.acm.org
Transport Layer Security (TLS) is a de facto standard for secure communication over the
Internet and other critical infrastructures. The trust model deployed in the TLS is based on …

Exploring website location as a security indicator

DY Yu, E Stobert, D Basin, S Capkun - arxiv preprint arxiv:1610.03647, 2016 - arxiv.org
Authenticating websites is an ongoing problem for users. Recent proposals have suggested
strengthening current server authentication methods by incorporating website location as a …

Strengthening Authentication and Integrity in Web Applications

N Karapanos - 2018 - research-collection.ethz.ch
Web applications have become one of the most common ways of providing access to online
information and services. People use their desktop or mobile browsers to surf the web and …