\begin{thebibliography}{10} \bibitem{kanonymity} V.~Ciriani, S.~De~Capitani di~Vimercati, S.~Foresti, and P.~Samarati. \newblock {k-Anonymity}. \newblock {\em Secure Data Management in Decentralized Systems}, pages 323--353, 2007. \bibitem{privacy} M.~Duckham and L.~Kulik. \newblock Location privacy and locationaware computing. \newblock {\em Dynamic and mobile GIS: investigating change in space and time}, pages 34--51, 2006. \bibitem{kprivacy} M.~Gruteser and D.~Grunwald. \newblock {Anonymous usage of location based services through spatial and temporal cloacking}. \newblock {\em Proceedings of the 1st international conference on Mobile systems, applications and services}, pages 31--42, 2003. \bibitem{Base64} S.~Josefsson. \newblock {RFC 4648 The Base16, Base32, and Base64 Data Encodings}. \newblock 2006. \bibitem{dummy} H.~Kido, Y.~Yanagisawa, and T.~Satoh. \newblock An anonymous communication technique using dummies for location-based services. \newblock {\em ICPS '05. Proceedings. International Conference on Pervasive Services}, pages 88--97, 2005. \bibitem{IRC} J.~Oikarinen and D.~Reed. \newblock {RFC 1459 Internet Relay Chat}. \newblock 2003. \bibitem{quadtree} H.~Samet. \newblock {The Quadtree and Related Hierarchical Data Structures}. \newblock {\em ACM Computing Surveys (CSUR)}, Volume 16:187--260, 1984. \bibitem{blowfish} B.~Schneier. \newblock Description of a new variable-length key, 64-bit block cipher (blowfish). \newblock {\em Fast Software Encryption, Cambridge Security Workshop Proceedings}, pages 191--204, 1994. \bibitem{bluetooth} Y.~Shaked and A.~Wool. \newblock Cracking the bluetooth pin. \newblock {\em Proceedings of the 3rd international conference on Mobile systems, applications, and services}, pages 39--50, 2005. \bibitem{geocaching} E.~Sherman. \newblock {Geocaching: hike and seek with your GPS.} \newblock {\em Computing Reviews}, Volume 46(2), 2005. \bibitem{SPALS} K.~Welke and K.~Rechert. \newblock {Spontaneous Privacy-Aware Location Sharing}. \newblock {\em In proceedings of the 4th International Conference on Pervasive Computing and Applications (ICPCA 2009)}, 2009. \end{thebibliography}