How to Construct Secure Cryptographic Location-Based Services

Jun Anzai, Tsutomu Matsumoto. How to Construct Secure Cryptographic Location-Based Services. In Tomoya Enokido, Lu Yan, Bin Xiao, Daeyoung Kim, Yuan-Shun Dai, Laurence Tianruo Yang, editors, Embedded and Ubiquitous Computing - EUC 2005 Workshops, EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Nagasaki, Japan, December 6-9, 2005, Proceedings. Volume 3823 of Lecture Notes in Computer Science, pages 894-904, Springer, 2005. [doi]

@inproceedings{AnzaiM05:0,
  title = {How to Construct Secure Cryptographic Location-Based Services},
  author = {Jun Anzai and Tsutomu Matsumoto},
  year = {2005},
  doi = {10.1007/11596042_92},
  url = {http://dx.doi.org/10.1007/11596042_92},
  tags = {rule-based},
  researchr = {https://researchr.org/publication/AnzaiM05%3A0},
  cites = {0},
  citedby = {0},
  pages = {894-904},
  booktitle = {Embedded and Ubiquitous Computing - EUC 2005 Workshops, EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Nagasaki, Japan, December 6-9, 2005, Proceedings},
  editor = {Tomoya Enokido and Lu Yan and Bin Xiao and Daeyoung Kim and Yuan-Shun Dai and Laurence Tianruo Yang},
  volume = {3823},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  isbn = {3-540-30803-2},
}