summaryrefslogtreecommitdiffstats
path: root/ausarbeitung/literature.bib
diff options
context:
space:
mode:
authorPatrick Hornecker2010-02-26 13:06:10 +0100
committerPatrick Hornecker2010-02-26 13:06:10 +0100
commit53a79046110073bf7d4ead6320794940c9507e5e (patch)
treed6409210f662eccf174d370554c83962fb433c6c /ausarbeitung/literature.bib
parenttex source and code modifications (diff)
downloadfriendfinder-53a79046110073bf7d4ead6320794940c9507e5e.tar.gz
friendfinder-53a79046110073bf7d4ead6320794940c9507e5e.tar.xz
friendfinder-53a79046110073bf7d4ead6320794940c9507e5e.zip
tex source
Diffstat (limited to 'ausarbeitung/literature.bib')
-rw-r--r--ausarbeitung/literature.bib51
1 files changed, 25 insertions, 26 deletions
diff --git a/ausarbeitung/literature.bib b/ausarbeitung/literature.bib
index ee9fcd4..af1c041 100644
--- a/ausarbeitung/literature.bib
+++ b/ausarbeitung/literature.bib
@@ -1,19 +1,25 @@
-@misc{IRC,
-title = {RFC 1459 Internet Relay Chat},
+@article{IRC,
+title = {{RFC 1459 Internet Relay Chat}},
author = {J. Oikarinen and D. Reed},
year = {2003},
}
-@misc{SPALS,
-title = {Spontaneous Privacy-Aware Location Sharing},
-author = {Konstantin Welke and Klaus Rechert},
-organization= {Lehrstuhl für Kommunikationssysteme, Albert-Ludwigs Universität Freiburg},
-year = {2009},
+@article{Base64,
+title = {{RFC 4648 The Base16, Base32, and Base64 Data Encodings}},
+author = {S. Josefsson},
+year = {2006},
}
+@article{SPALS,
+title = {{Spontaneous Privacy-Aware Location Sharing}},
+author = {K. Welke and K. Rechert},
+journal= {In proceedings of the 4th International Conference on Pervasive Computing and Applications (ICPCA 2009)},
+year = {2009},
+}
+2
@article{privacy,
title = {Location privacy and locationaware computing},
-author = {Matt Duckham and Lars Kulik},
+author = {M. Duckham and L. Kulik},
journal = {Dynamic and mobile GIS: investigating change in space and time},
year = {2006},
pages = {34-51},
@@ -21,7 +27,7 @@ pages = {34-51},
@article{bluetooth,
title = {Cracking the Bluetooth PIN},
-author = {Yaniv Shaked and Avishai Wool},
+author = {Y. Shaked and A. Wool},
journal = {Proceedings of the 3rd international conference on Mobile systems, applications, and services},
organization= {School of Electrical Engineering Systems Tel Aviv University},
year = {2005},
@@ -30,31 +36,31 @@ pages = {39-50},
@article{blowfish,
title = {Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish)},
-author = {Bruce Schneier},
+author = {B. Schneier},
year = {1994},
journal = {Fast Software Encryption, Cambridge Security Workshop Proceedings},
pages = {191-204},
}
@article{kprivacy,
-title = {Anonymous usage of location based services through spatial and temporal cloacking},
-author = {Marco Gruteser and Dirk Grunwald},
+title = {{Anonymous usage of location based services through spatial and temporal cloacking}},
+author = {M. Gruteser and D. Grunwald},
year = {2003},
journal = {Proceedings of the 1st international conference on Mobile systems, applications and services},
pages = {31-42},
}
@article{kanonymity,
-title = {k-Anonymity},
-author = {Valentina Ciriani and Sabrina De Capitani di Vimercati and Sara Foresti and Pierangela Samarati},
+title = {{k-Anonymity}},
+author = {V. Ciriani and S. De Capitani di Vimercati and S. Foresti and P. Samarati},
year = {2007},
journal = {Secure Data Management in Decentralized Systems},
pages = {323-353},
}
@article{quadtree,
-title = {The Quadtree and Related Hierarchical Data Structures},
-author = {Hanan Samet},
+title = {{The Quadtree and Related Hierarchical Data Structures}},
+author = {H. Samet},
year = {1984},
journal = {ACM Computing Surveys (CSUR)},
pages = {187-260},
@@ -63,24 +69,17 @@ volume = {Volume 16},
@article{dummy,
title = {An anonymous communication technique using dummies for location-based services},
-author = {Hidetoshi Kido and Yutaka Yanagisawa and Tetsuji Satoh},
+author = {H. Kido and Y. Yanagisawa and T. Satoh},
year = {2005},
journal = {ICPS '05. Proceedings. International Conference on Pervasive Services},
pages = {88-97},
}
@article{geocaching,
-title = {Geocaching: hike and seek with your GPS.},
-author = {Erik Sherman},
+title = {{Geocaching: hike and seek with your GPS.}},
+author = {E. Sherman},
year = {2005},
journal = {Computing Reviews},
volume = {Volume 46},
number = {2},
}
-
-@article{symm,
-author = {Günter Müller},
-howpublished = {Vorlesung IT-Sicherheit},
-year = {2009},
-page = {17-18},
-}