summaryrefslogblamecommitdiffstats
path: root/ausarbeitung/maindoc.bbl
blob: b9761a7a6d65c2d984750687a51344a4de0f413d (plain) (tree)
1
2
3
4
5
6
7
8
9

                           
                    

                                                                     


                                                                      
                 
                        



                                                                               
                  


                                                                         


                                                                        




                                                                   
               
                                     




                                                                               

                         

                                         

                  

                                                                  


                                                                       
            





                                                                       
                      



                                                                        
                    

                                                    

                                                      
               



                                                                              

                     
\begin{thebibliography}{10}

\bibitem{kanonymity}
V.~Ciriani, S.~De~Capitani di~Vimercati, S.~Foresti, and P.~Samarati.
\newblock {k-Anonymity}.
\newblock {\em Secure Data Management in Decentralized Systems}, pages
  323--353, 2007.

\bibitem{privacy}
M.~Duckham and L.~Kulik.
\newblock Location privacy and locationaware computing.
\newblock {\em Dynamic and mobile GIS: investigating change in space and time},
  pages 34--51, 2006.

\bibitem{kprivacy}
M.~Gruteser and D.~Grunwald.
\newblock {Anonymous usage of location based services through spatial and
  temporal cloacking}.
\newblock {\em Proceedings of the 1st international conference on Mobile
  systems, applications and services}, pages 31--42, 2003.

\bibitem{Base64}
S.~Josefsson.
\newblock {RFC 4648 The Base16, Base32, and Base64 Data Encodings}.
\newblock 2006.

\bibitem{dummy}
H.~Kido, Y.~Yanagisawa, and T.~Satoh.
\newblock An anonymous communication technique using dummies for location-based
  services.
\newblock {\em ICPS '05. Proceedings. International Conference on Pervasive
  Services}, pages 88--97, 2005.

\bibitem{IRC}
J.~Oikarinen and D.~Reed.
\newblock {RFC 1459 Internet Relay Chat}.
\newblock 2003.

\bibitem{quadtree}
H.~Samet.
\newblock {The Quadtree and Related Hierarchical Data Structures}.
\newblock {\em ACM Computing Surveys (CSUR)}, Volume 16:187--260, 1984.

\bibitem{blowfish}
B.~Schneier.
\newblock Description of a new variable-length key, 64-bit block cipher
  (blowfish).
\newblock {\em Fast Software Encryption, Cambridge Security Workshop
  Proceedings}, pages 191--204, 1994.

\bibitem{bluetooth}
Y.~Shaked and A.~Wool.
\newblock Cracking the bluetooth pin.
\newblock {\em Proceedings of the 3rd international conference on Mobile
  systems, applications, and services}, pages 39--50, 2005.

\bibitem{geocaching}
E.~Sherman.
\newblock {Geocaching: hike and seek with your GPS.}
\newblock {\em Computing Reviews}, Volume 46(2), 2005.

\bibitem{SPALS}
K.~Welke and K.~Rechert.
\newblock {Spontaneous Privacy-Aware Location Sharing}.
\newblock {\em In proceedings of the 4th International Conference on Pervasive
  Computing and Applications (ICPCA 2009)}, 2009.

\end{thebibliography}