@misc{qrcode, title = {QR Code}, url = {http://www.denso-wave.com/qrcode/qrstandard-e.html}, Note = {[Online; letzter Aufruf 11.02.2010]}, } @misc{IRC, title = {RFC 1459 Internet Relay Chat}, author = {J. Oikarinen and D. Reed}, year = {2003}, } @misc{SPALS, title = {Spontaneous Privacy-Aware Location Sharing}, author = {Konstantin Welke and Klaus Rechert}, organization= {Lehrstuhl für Kommunikationssysteme, Albert-Ludwigs Universität Freiburg}, year = {2009}, } @article{privacy, title = {Location privacy and locationaware computing}, author = {Matt Duckham and Lars Kulik}, journal = {Dynamic and mobile GIS: investigating change in space and time}, year = {2006}, pages = {34-51}, } @article{bluetooth, title = {Cracking the Bluetooth PIN}, author = {Yaniv Shaked and Avishai Wool}, journal = {Proceedings of the 3rd international conference on Mobile systems, applications, and services}, organization= {School of Electrical Engineering Systems Tel Aviv University}, year = {2005}, pages = {39-50}, } @article{blowfish, title = {Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish)}, author = {Bruce Schneier}, year = {1994}, journal = {Fast Software Encryption, Cambridge Security Workshop Proceedings}, pages = {191-204}, } @article{kprivacy, title = {Anonymous usage of location based services through spatial and temporal cloacking}, author = {Marco Gruteser and Dirk Grunwald}, year = {2003}, journal = {Proceedings of the 1st international conference on Mobile systems, applications and services}, pages = {31-42}, } @article{kanonymity, title = {k-Anonymity}, author = {Valentina Ciriani and Sabrina De Capitani di Vimercati and Sara Foresti and Pierangela Samarati}, year = {2007}, journal = {Secure Data Management in Decentralized Systems}, pages = {323-353}, } @article{quadtree, title = {The Quadtree and Related Hierarchical Data Structures}, author = {Hanan Samet}, year = {1984}, journal = {ACM Computing Surveys (CSUR)}, pages = {187-260}, volume = {Volume 16}, } @article{dummy, title = {An anonymous communication technique using dummies for location-based services}, author = {Hidetoshi Kido and Yutaka Yanagisawa and Tetsuji Satoh}, year = {2005}, journal = {ICPS '05. Proceedings. International Conference on Pervasive Services}, pages = {88-97}, } @article{geocaching, title = {Geocaching: hike and seek with your GPS.}, author = {Erik Sherman}, year = {2005}, journal = {Computing Reviews}, volume = {Volume 46}, number = {2}, } @article{symm, author = {Günter Müller}, howpublished = {Vorlesung IT-Sicherheit}, year = {2009}, page = {17-18}, }