summaryrefslogblamecommitdiffstats
path: root/ausarbeitung/literature.bib~
blob: 3db65311485362597e72ec02bc751db3b69eb1b5 (plain) (tree)
1
2
3
4
5
6
7
8
9
10





                                                           



                                       



                                                     
                                              
                                                                                           


              
                 

                                                       
                                                                           

                

 








                                                                                                          
                  




                                                                                   

























                                                                                                           

















                                                                                         
              




                                         
@misc{qrcode,
title = {QR Code},
url = {http://www.denso-wave.com/qrcode/qrstandard-e.html},
Note = {[Online; letzter Aufruf 11.02.2010]},
}

@misc{IRC,
title = {RFC 1459 Internet Relay Chat},
author = {J. Oikarinen and D. Reed},
year = {2003},
}

@misc{SPALS,
title = {Spontaneous Privacy-Aware Location Sharing},
author = {Konstantin Welke and Klaus Rechert},
organization= {Lehrstuhl für Kommunikationssysteme, Albert-Ludwigs Universität Freiburg},
year = {2009},
}

@article{privacy,
title = {Location privacy and locationaware computing},
author = {Matt Duckham and Lars Kulik},
journal = {Dynamic and mobile GIS: investigating change in space and time},
year = {2006},
pages = {34-51},
}

@article{bluetooth,
title = {Cracking the Bluetooth PIN},
author = {Yaniv Shaked and Avishai Wool},
journal = {Proceedings of the 3rd international conference on Mobile systems, applications, and services},
organization= {School of Electrical Engineering Systems Tel Aviv University},
year = {2005},
pages = {39-50},
}

@article{blowfish,
title = {Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish)},
author = {Bruce Schneier},
year = {1994},
journal = {Fast Software Encryption, Cambridge Security Workshop Proceedings},
pages = {191-204},
}

@article{kprivacy,
title = {Anonymous usage of location based services through spatial and temporal cloacking},
author = {Marco Gruteser and Dirk Grunwald},
year = {2003},
journal = {Proceedings of the 1st international conference on Mobile systems, applications and services},
pages = {31-42},
}

@article{kanonymity,
title = {k-Anonymity},
author = {Valentina Ciriani and Sabrina De Capitani di Vimercati and Sara Foresti and Pierangela Samarati},
year = {2007},
journal = {Secure Data Management in Decentralized Systems},
pages = {323-353},
}

@article{quadtree,
title = {The Quadtree and Related Hierarchical Data Structures},
author = {Hanan Samet},
year = {1984},
journal = {ACM Computing Surveys (CSUR)},
pages = {187-260},
volume = {Volume 16},
}

@article{dummy,
title = {An anonymous communication technique using dummies for location-based services},
author = {Hidetoshi Kido and Yutaka Yanagisawa and Tetsuji Satoh},
year = {2005},
journal = {ICPS '05. Proceedings. International Conference on Pervasive Services},
pages = {88-97},
}

@article{geocaching,
title = {Geocaching: hike and seek with your GPS.},
author = {Erik Sherman},
year = {2005},
journal = {Computing Reviews},
volume = {Volume 46},
number = {2},
}

@article{symm,
author = {Günter Müller},
howpublished = {Vorlesung IT-Sicherheit},
year = {2009},
page = {17-18},
}