Citations in impact factor journals
Random security scheme selection for mobile transactions Security and Communication Networks |
Citation to this article as recorded by
Gao, H., S. Wang and H. Lu, 2011. Local positioning systems for mobile devices based on ontology. Inform. Technol. J., 10: 168-174. CrossRefDirect Link |
Liao, H.C. and P.C. Lee, 2010. A novel vision-based location authentication approach in a ubiquitous camera environment. Inform. Technol. J., 9: 1571-1584. CrossRefDirect Link |
Tang, J. and L. Wang, 2013. An improved rijndael encryption algorithm based on niosii. Inf. Technol. J., 12: 1434-1438. CrossRefDirect Link |
Citation to this article as recorded by
A novel location-based encryption model using fuzzy vault
scheme Soft Computing |
A trustworthy agent-based encrypted access control
method for mobile cloud computing environment Pervasive and Mobile Computing |
Implementing Location-Based Cryptography on Mobile Application Design to Secure Data in Cloud Storage Journal of Physics: Conference Series Vol. 1551, Issue 1, 012008, 2020 |
A Novel Markov Model-Based Low-Power and Secure Multihop Routing Mechanism Journal of Sensors |
A novel vision-based location authentication approach in a ubiquitous camera environment. Information Technology Journal Vol. 9, Issue 8, 1571, 2010 |
Local positioning systems for mobile devices based on ontology. Information Technology Journal Vol. 10, Issue 1, 168, 2011 |
Access Control Management of Cloud Storage System Based
on NSSC in Mobile Network Applied Mechanics and Materials |
How to cite this article
Hsien- Chou Liao and Yun -Hsiang Chao, 2008. A New Data Encryption Algorithm Based on the Location of Mobile Users. Information Technology Journal, 7: 63-69.
DOI: 10.3923/itj.2008.63.69
URL: https://scialert.net/abstract/?doi=itj.2008.63.69
DOI: 10.3923/itj.2008.63.69
URL: https://scialert.net/abstract/?doi=itj.2008.63.69