Coordinate Based Encryption Protocol

Provided by: International Journal of Innovative Research in Information Security (IJIRIS)
Topic: Security
Format: PDF
There are several security mechanisms available today. Most of the communication systems, web-sites use SSL/TLS services. So, communication channel is protected. Although, unauthorized users may access any confidential data from a distance. Neither do they need to be present at the receiving end nor do they attack the communication channel. The authors' aim is to restrict the unauthorized access to confidential data based on coordinate system. To properly decrypt the information, a receiver must be present at a particular coordinate. If an unauthorized person tries to decrypt the confidential data, they will fail.

Find By Topic