summaryrefslogtreecommitdiffstats
path: root/ausarbeitung/maindoc.bbl
diff options
context:
space:
mode:
Diffstat (limited to 'ausarbeitung/maindoc.bbl')
-rw-r--r--ausarbeitung/maindoc.bbl45
1 files changed, 24 insertions, 21 deletions
diff --git a/ausarbeitung/maindoc.bbl b/ausarbeitung/maindoc.bbl
index 6ea8704..b9761a7 100644
--- a/ausarbeitung/maindoc.bbl
+++ b/ausarbeitung/maindoc.bbl
@@ -1,65 +1,68 @@
\begin{thebibliography}{10}
\bibitem{kanonymity}
-Valentina Ciriani, Sabrina De~Capitani di~Vimercati, Sara Foresti, and
- Pierangela Samarati.
-\newblock k-anonymity.
+V.~Ciriani, S.~De~Capitani di~Vimercati, S.~Foresti, and P.~Samarati.
+\newblock {k-Anonymity}.
\newblock {\em Secure Data Management in Decentralized Systems}, pages
323--353, 2007.
\bibitem{privacy}
-Matt Duckham and Lars Kulik.
+M.~Duckham and L.~Kulik.
\newblock Location privacy and locationaware computing.
\newblock {\em Dynamic and mobile GIS: investigating change in space and time},
pages 34--51, 2006.
\bibitem{kprivacy}
-Marco Gruteser and Dirk Grunwald.
-\newblock Anonymous usage of location based services through spatial and
- temporal cloacking.
+M.~Gruteser and D.~Grunwald.
+\newblock {Anonymous usage of location based services through spatial and
+ temporal cloacking}.
\newblock {\em Proceedings of the 1st international conference on Mobile
systems, applications and services}, pages 31--42, 2003.
+\bibitem{Base64}
+S.~Josefsson.
+\newblock {RFC 4648 The Base16, Base32, and Base64 Data Encodings}.
+\newblock 2006.
+
\bibitem{dummy}
-Hidetoshi Kido, Yutaka Yanagisawa, and Tetsuji Satoh.
+H.~Kido, Y.~Yanagisawa, and T.~Satoh.
\newblock An anonymous communication technique using dummies for location-based
services.
\newblock {\em ICPS '05. Proceedings. International Conference on Pervasive
Services}, pages 88--97, 2005.
-\bibitem{symm}
-Günter Müller.
-\newblock 2009.
-
\bibitem{IRC}
J.~Oikarinen and D.~Reed.
-\newblock Rfc 1459 internet relay chat, 2003.
+\newblock {RFC 1459 Internet Relay Chat}.
+\newblock 2003.
\bibitem{quadtree}
-Hanan Samet.
-\newblock The quadtree and related hierarchical data structures.
+H.~Samet.
+\newblock {The Quadtree and Related Hierarchical Data Structures}.
\newblock {\em ACM Computing Surveys (CSUR)}, Volume 16:187--260, 1984.
\bibitem{blowfish}
-Bruce Schneier.
+B.~Schneier.
\newblock Description of a new variable-length key, 64-bit block cipher
(blowfish).
\newblock {\em Fast Software Encryption, Cambridge Security Workshop
Proceedings}, pages 191--204, 1994.
\bibitem{bluetooth}
-Yaniv Shaked and Avishai Wool.
+Y.~Shaked and A.~Wool.
\newblock Cracking the bluetooth pin.
\newblock {\em Proceedings of the 3rd international conference on Mobile
systems, applications, and services}, pages 39--50, 2005.
\bibitem{geocaching}
-Erik Sherman.
-\newblock Geocaching: hike and seek with your gps.
+E.~Sherman.
+\newblock {Geocaching: hike and seek with your GPS.}
\newblock {\em Computing Reviews}, Volume 46(2), 2005.
\bibitem{SPALS}
-Konstantin Welke and Klaus Rechert.
-\newblock Spontaneous privacy-aware location sharing, 2009.
+K.~Welke and K.~Rechert.
+\newblock {Spontaneous Privacy-Aware Location Sharing}.
+\newblock {\em In proceedings of the 4th International Conference on Pervasive
+ Computing and Applications (ICPCA 2009)}, 2009.
\end{thebibliography}