summaryrefslogtreecommitdiffstats
path: root/ausarbeitung/literature.bib.backup
diff options
context:
space:
mode:
authorPatrick Hornecker2010-02-26 13:06:10 +0100
committerPatrick Hornecker2010-02-26 13:06:10 +0100
commit53a79046110073bf7d4ead6320794940c9507e5e (patch)
treed6409210f662eccf174d370554c83962fb433c6c /ausarbeitung/literature.bib.backup
parenttex source and code modifications (diff)
downloadfriendfinder-53a79046110073bf7d4ead6320794940c9507e5e.tar.gz
friendfinder-53a79046110073bf7d4ead6320794940c9507e5e.tar.xz
friendfinder-53a79046110073bf7d4ead6320794940c9507e5e.zip
tex source
Diffstat (limited to 'ausarbeitung/literature.bib.backup')
-rw-r--r--ausarbeitung/literature.bib.backup42
1 files changed, 24 insertions, 18 deletions
diff --git a/ausarbeitung/literature.bib.backup b/ausarbeitung/literature.bib.backup
index 13969e0..904da8b 100644
--- a/ausarbeitung/literature.bib.backup
+++ b/ausarbeitung/literature.bib.backup
@@ -1,19 +1,25 @@
-@misc{qrcode,
-title = {QR Code},
-url = {http://www.denso-wave.com/qrcode/qrstandard-e.html},
-Note = {[Online; letzter Aufruf 11.02.2010]},
+@misc{IRC,
+title = {RFC 1459 Internet Relay Chat},
+author = {J. Oikarinen and D. Reed},
+year = {2003},
+}
+
+@misc{Base64,
+title = {RFC 4648},
+author = {S. Josefsson},
+year = {2006},
}
-@misc{SPALS,
+@article{SPALS,
title = {Spontaneous Privacy-Aware Location Sharing},
-author = {Konstantin Welke and Klaus Rechert},
-organization= {Lehrstuhl für Kommunikationssysteme, Albert-Ludwigs Universität Freiburg},
+author = {K. Welke and K. Rechert},
+journal= {In proceedings of the 4th International Conference on Pervasive Computing and Applications (ICPCA 2009)},
year = {2009},
}
@article{privacy,
title = {Location privacy and locationaware computing},
-author = {Matt Duckham and Lars Kulik},
+author = {M. Duckham and L. Kulik},
journal = {Dynamic and mobile GIS: investigating change in space and time},
year = {2006},
pages = {34-51},
@@ -21,7 +27,7 @@ pages = {34-51},
@article{bluetooth,
title = {Cracking the Bluetooth PIN},
-author = {Yaniv Shaked and Avishai Wool},
+author = {Y. Shaked and A. Wool},
journal = {Proceedings of the 3rd international conference on Mobile systems, applications, and services},
organization= {School of Electrical Engineering Systems Tel Aviv University},
year = {2005},
@@ -30,7 +36,7 @@ pages = {39-50},
@article{blowfish,
title = {Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish)},
-author = {Bruce Schneier},
+author = {B. Schneier},
year = {1994},
journal = {Fast Software Encryption, Cambridge Security Workshop Proceedings},
pages = {191-204},
@@ -38,7 +44,7 @@ pages = {191-204},
@article{kprivacy,
title = {Anonymous usage of location based services through spatial and temporal cloacking},
-author = {Marco Gruteser and Dirk Grunwald},
+author = {M. Gruteser and D. Grunwald},
year = {2003},
journal = {Proceedings of the 1st international conference on Mobile systems, applications and services},
pages = {31-42},
@@ -46,7 +52,7 @@ pages = {31-42},
@article{kanonymity,
title = {k-Anonymity},
-author = {Valentina Ciriani and Sabrina De Capitani di Vimercati and Sara Foresti and Pierangela Samarati},
+author = {V. Ciriani and S. De Capitani di Vimercati and S. Foresti and P. Samarati},
year = {2007},
journal = {Secure Data Management in Decentralized Systems},
pages = {323-353},
@@ -54,7 +60,7 @@ pages = {323-353},
@article{quadtree,
title = {The Quadtree and Related Hierarchical Data Structures},
-author = {Hanan Samet},
+author = {H. Samet},
year = {1984},
journal = {ACM Computing Surveys (CSUR)},
pages = {187-260},
@@ -63,7 +69,7 @@ volume = {Volume 16},
@article{dummy,
title = {An anonymous communication technique using dummies for location-based services},
-author = {Hidetoshi Kido and Yutaka Yanagisawa and Tetsuji Satoh},
+author = {H. Kido and Y. Yanagisawa and T. Satoh},
year = {2005},
journal = {ICPS '05. Proceedings. International Conference on Pervasive Services},
pages = {88-97},
@@ -71,7 +77,7 @@ pages = {88-97},
@article{geocaching,
title = {Geocaching: hike and seek with your GPS.},
-author = {Erik Sherman},
+author = {E. Sherman},
year = {2005},
journal = {Computing Reviews},
volume = {Volume 46},
@@ -79,8 +85,8 @@ number = {2},
}
@article{symm,
-author = {Günter Müller},
-howpublished = {Vorlesung IT-Sicherheit},
+author = {G. Müller},
+title = {Vorlesung IT-Sicherheit},
year = {2009},
-page = {17-18},
+pages = {17-18},
}