Database Reference
In-Depth Information
[57] S. Jirka, A. Broring, C. Stasch. Discovery Mechanisms for the Sensor
Web,
Sensors
, 9, pp. 2661-2681, 2009.
[58] A. Juels. Minimalist Cryptography for RFID Tags.
Conference on
Security in Communication Networks
, 2004.
[59] A. Juels, R. Rivest, M. Szydlo. The Blocker Tag: Selective Blocking
of RFID tags for Consumer Privacy.
ACM Conference on Computer
and Communication Security
, pp. 103-111, 2003.
[60] A. Juels, J. Brainard. Soft Blocking: Flexible Blocker Tags on the
Cheap,
Workshop on Privacy in the Electronic Society (WPES 04)
,
pp. 1-7, 2004.
[61] A. Juels. RFID Security and Privacy: A Research Survey,
IEEE
Journal on Selected Areas in Communication
, vol. 24, pp. 381-394,
Feb. 2006.
[62] A. Juels, R. Pappu. Squealing Euros: Privacy protection in RFIDen-
abled banknotes.
Proceedings of Financial Cryptography
, Springer-
Verlag, 2003.
[63] L. Kagal, T. Finin, A. Joshi. A Policy-based Approach to Security
for the Semantic Web,
ISWC
, 2003.
[64] L. Kagal, M. Paolucci, N. Srinivasan, G. Denker, T. Finin, K.
Sycara. Authorization and Privacy for Semantic Web Services,
IEEE
Intelligent Systems
, 19(4), 2004.
[65] A. Katasonov, O. Kaykova, O. Khriyenko, S. Nikitin, V. Terziyan.
Smart Semantic Middleware for the Internet of Things,
ICINCO
,
2008.
[66] N. Khoussainova, M. Balazinska, D. Suciu. Towards Correcting In-
put Data Errors Probabilistically Using Integrity Constraints.
Fifth
International ACM Workshop on Data Engineering for Wireless and
Mobile Access (MobiDE'06)
, 2006.
[67] C. Kiefer, A. Bernstein, M. Stocker. The fundamentals of iSPARQL
- a virtual triple approach for similarity-based Semantic Web tasks.
ISWC
, 2007.
[68] Y. Kim, B. Kim, J. Lee, H. Lim. The path index for query processing
on RDF and RDF Schema.
ICACT
, 2005.
[69] S. Kinoshita, F. Hoshino, T. Komuro, A. Fujimura, M. Ohkubo.
Low-cost RFID privacy protection scheme.
IPS Journal
, 45(8), 2004.
[70] R. Kumar, E. Kohler, M. Srivastava. Harbor: software-based mem-
ory protection for sensor nodes,
IPSN Conference
, 2007.
[71] M. Langheinrich. A Survey of RFID Privacy Approaches.
Personal
and Ubiquitous Computing
, Springer, 2008.