{"record_type":"pith_number_record","schema_url":"https://pith.science/schemas/pith-number/v1.json","pith_number":"pith:2019:VHFUYNCIMBWGSNHOT4A4LI56IV","short_pith_number":"pith:VHFUYNCI","schema_version":"1.0","canonical_sha256":"a9cb4c3448606c6934ee9f01c5a3be454195bc9a1928b44765b6f4536fb9724d","source":{"kind":"arxiv","id":"1906.11288","version":1},"attestation_state":"computed","paper":{"title":"Secure Client and Server Geolocation Over the Internet","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.CR","authors_text":"AbdelRahman Abdou, Paul C. van Oorschot","submitted_at":"2019-06-26T18:27:28Z","abstract_excerpt":"In this article, we provide a summary of recent efforts towards achieving Internet geolocation securely, \\ie without allowing the entity being geolocated to cheat about its own geographic location. Cheating motivations arise from many factors, including impersonation (in the case locations are used to reinforce authentication), and gaining location-dependent benefits. In particular, we provide a technical overview of Client Presence Verification (CPV) and Server Location Verification (SLV)---two recently proposed techniques designed to verify the geographic locations of clients and servers in "},"verification_status":{"content_addressed":true,"pith_receipt":true,"author_attested":false,"weak_author_claims":0,"strong_author_claims":0,"externally_anchored":false,"storage_verified":false,"citation_signatures":0,"replication_records":0,"graph_snapshot":true,"references_resolved":false,"formal_links_present":false},"canonical_record":{"source":{"id":"1906.11288","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2019-06-26T18:27:28Z","cross_cats_sorted":[],"title_canon_sha256":"01c5e3a8e77ba6e672025ba90cb44b13313a614cfbb4ff6a52fd984f59efc561","abstract_canon_sha256":"e904f930d75989c4acb31ea3a9c46d1adc4697b5c4634d7830592d675fed96d4"},"schema_version":"1.0"},"receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-17T23:42:07.588035Z","signature_b64":"OOWqAGzOyzyGixMG0yOiSIKlcMKZqSXcWAzrqm2srT3Izad5Feq1wgUajjTb0+GNoK+gZklX3JoIzrBC7mygAg==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"a9cb4c3448606c6934ee9f01c5a3be454195bc9a1928b44765b6f4536fb9724d","last_reissued_at":"2026-05-17T23:42:07.587290Z","signature_status":"signed_v1","first_computed_at":"2026-05-17T23:42:07.587290Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"graph_snapshot":{"paper":{"title":"Secure Client and Server Geolocation Over the Internet","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.CR","authors_text":"AbdelRahman Abdou, Paul C. van Oorschot","submitted_at":"2019-06-26T18:27:28Z","abstract_excerpt":"In this article, we provide a summary of recent efforts towards achieving Internet geolocation securely, \\ie without allowing the entity being geolocated to cheat about its own geographic location. Cheating motivations arise from many factors, including impersonation (in the case locations are used to reinforce authentication), and gaining location-dependent benefits. In particular, we provide a technical overview of Client Presence Verification (CPV) and Server Location Verification (SLV)---two recently proposed techniques designed to verify the geographic locations of clients and servers in "},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1906.11288","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"aliases":[{"alias_kind":"arxiv","alias_value":"1906.11288","created_at":"2026-05-17T23:42:07.587432+00:00"},{"alias_kind":"arxiv_version","alias_value":"1906.11288v1","created_at":"2026-05-17T23:42:07.587432+00:00"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1906.11288","created_at":"2026-05-17T23:42:07.587432+00:00"},{"alias_kind":"pith_short_12","alias_value":"VHFUYNCIMBWG","created_at":"2026-05-18T12:33:30.264802+00:00"},{"alias_kind":"pith_short_16","alias_value":"VHFUYNCIMBWGSNHO","created_at":"2026-05-18T12:33:30.264802+00:00"},{"alias_kind":"pith_short_8","alias_value":"VHFUYNCI","created_at":"2026-05-18T12:33:30.264802+00:00"}],"events":[],"event_summary":{},"paper_claims":[],"inbound_citations":{"count":0,"internal_anchor_count":0,"sample":[]},"formal_canon":{"evidence_count":0,"sample":[],"anchors":[]},"links":{"html":"https://pith.science/pith/VHFUYNCIMBWGSNHOT4A4LI56IV","json":"https://pith.science/pith/VHFUYNCIMBWGSNHOT4A4LI56IV.json","graph_json":"https://pith.science/api/pith-number/VHFUYNCIMBWGSNHOT4A4LI56IV/graph.json","events_json":"https://pith.science/api/pith-number/VHFUYNCIMBWGSNHOT4A4LI56IV/events.json","paper":"https://pith.science/paper/VHFUYNCI"},"agent_actions":{"view_html":"https://pith.science/pith/VHFUYNCIMBWGSNHOT4A4LI56IV","download_json":"https://pith.science/pith/VHFUYNCIMBWGSNHOT4A4LI56IV.json","view_paper":"https://pith.science/paper/VHFUYNCI","resolve_alias":"https://pith.science/api/pith-number/resolve?arxiv=1906.11288&json=true","fetch_graph":"https://pith.science/api/pith-number/VHFUYNCIMBWGSNHOT4A4LI56IV/graph.json","fetch_events":"https://pith.science/api/pith-number/VHFUYNCIMBWGSNHOT4A4LI56IV/events.json","actions":{"anchor_timestamp":"https://pith.science/pith/VHFUYNCIMBWGSNHOT4A4LI56IV/action/timestamp_anchor","attest_storage":"https://pith.science/pith/VHFUYNCIMBWGSNHOT4A4LI56IV/action/storage_attestation","attest_author":"https://pith.science/pith/VHFUYNCIMBWGSNHOT4A4LI56IV/action/author_attestation","sign_citation":"https://pith.science/pith/VHFUYNCIMBWGSNHOT4A4LI56IV/action/citation_signature","submit_replication":"https://pith.science/pith/VHFUYNCIMBWGSNHOT4A4LI56IV/action/replication_record"}},"created_at":"2026-05-17T23:42:07.587432+00:00","updated_at":"2026-05-17T23:42:07.587432+00:00"}