Database Reference
In-Depth Information
International ACM Workshop on Data Engineering for Wireless and
Mobile Access (MobiDE'06) , 2006.
[47] N. Khoussainova, M. Balazinska, D. Suciu. Peex: Extracting prob-
abilistic events from RFID data. Technical Report 2007-11-02, De-
partment of Computer Science and Engineering, University of Wash-
ington , 2007.
[48] S. Kinoshita, F. Hoshino, T. Komuro, A. Fujimura, M. Ohkubo.
Low-cost RFID privacy protection scheme. IPS Journal , 45(8), 2004.
[49] T. Kriplean, E. Welbourne, N. Khoussainova, V. Rastogi, M. Bal-
azinska, G. Borriello, T. Kohno, D. Suciu. Physical Access Control
for Captured RFID Data, IEEE Pervasive Computing , 6(4), 2007.
[50] J. Landt. The History of RFID. IEEE Potentials ,Oto-
ber/November 2005.
[51] M. Langheinrich. A Survey of RFID Privacy Approaches. Personal
and Ubiquitous Computing , Springer, 2008.
[52] G. Liao, J. Li, L. Chen, C. Wen. KLEAP: An Ecient Cleaning
Method to Remove Cross-Reads in RFID Data Streams, ACM CIKM
Conference , 2011.
[53] V. Krishnamurthy, S. Chawathe, S. Ramachandran, S. Sarma. Man-
aging RFID Data, VLDB Conference , 2004.
[54] R. McManus. The End of Lost Luggage? RFID Slowly Coming to
Airports, ReadWriteWeb , 2009.
http://www.readwriteweb.com/archives/the_end_of_lost_
luggage_rfid.php
[55] D. Molnar, D. Wagner. Privacy and Security in Library RFID: Is-
sues, Practices and Architectures, CCS , 2004.
[56] L. Ni, Y. Liu, Y. Lau, A. Patil. LANDMARC: Indoor Location
Sensing using Active RFID, Wireless Networks , 10(6), pp. 701-710,
2004.
[57] M. Ohkubo, K. Suzuki, S. Kinoshita. RFID Privacy Issues and Tech-
nical Challenges, Communications of the ACM , 48(9), 2005.
[58] M. Ohkubo, K. Suzuki, S. Kinoshita. A cryptographic approach to
“privacy-friendly” tags. RFID Privacy Workshop , 2003.
[59] J. Rao, S. Doraiswamy, H. Thakkar, L. S. Colby. A Deferred Cleans-
ing Method for RFID Data Analytics, VLDB Conference , 2006.
[60] V. Rastogi, E. Welbourne, N. Khoussainova, T. Kriplean, M. Bal-
azinska, G. Borriello, T. Kohno, D. Suciu. Expressing Privacy Poli-
cies using Authorization Views, International Workshop on Privacy
in UbiComp (UbiComp'07) , 2007.
Search WWH ::




Custom Search