Database Reference
In-Depth Information
[57] S. Jirka, A. Broring, C. Stasch. Discovery Mechanisms for the Sensor
Web, Sensors , 9, pp. 2661-2681, 2009.
[58] A. Juels. Minimalist Cryptography for RFID Tags. Conference on
Security in Communication Networks , 2004.
[59] A. Juels, R. Rivest, M. Szydlo. The Blocker Tag: Selective Blocking
of RFID tags for Consumer Privacy. ACM Conference on Computer
and Communication Security , pp. 103-111, 2003.
[60] A. Juels, J. Brainard. Soft Blocking: Flexible Blocker Tags on the
Cheap, Workshop on Privacy in the Electronic Society (WPES 04) ,
pp. 1-7, 2004.
[61] A. Juels. RFID Security and Privacy: A Research Survey, IEEE
Journal on Selected Areas in Communication , vol. 24, pp. 381-394,
Feb. 2006.
[62] A. Juels, R. Pappu. Squealing Euros: Privacy protection in RFIDen-
abled banknotes. Proceedings of Financial Cryptography , Springer-
Verlag, 2003.
[63] L. Kagal, T. Finin, A. Joshi. A Policy-based Approach to Security
for the Semantic Web, ISWC , 2003.
[64] L. Kagal, M. Paolucci, N. Srinivasan, G. Denker, T. Finin, K.
Sycara. Authorization and Privacy for Semantic Web Services, IEEE
Intelligent Systems , 19(4), 2004.
[65] A. Katasonov, O. Kaykova, O. Khriyenko, S. Nikitin, V. Terziyan.
Smart Semantic Middleware for the Internet of Things, ICINCO ,
2008.
[66] N. Khoussainova, M. Balazinska, D. Suciu. Towards Correcting In-
put Data Errors Probabilistically Using Integrity Constraints. Fifth
International ACM Workshop on Data Engineering for Wireless and
Mobile Access (MobiDE'06) , 2006.
[67] C. Kiefer, A. Bernstein, M. Stocker. The fundamentals of iSPARQL
- a virtual triple approach for similarity-based Semantic Web tasks.
ISWC , 2007.
[68] Y. Kim, B. Kim, J. Lee, H. Lim. The path index for query processing
on RDF and RDF Schema. ICACT , 2005.
[69] S. Kinoshita, F. Hoshino, T. Komuro, A. Fujimura, M. Ohkubo.
Low-cost RFID privacy protection scheme. IPS Journal , 45(8), 2004.
[70] R. Kumar, E. Kohler, M. Srivastava. Harbor: software-based mem-
ory protection for sensor nodes, IPSN Conference , 2007.
[71] M. Langheinrich. A Survey of RFID Privacy Approaches. Personal
and Ubiquitous Computing , Springer, 2008.
Search WWH ::




Custom Search