summaryrefslogtreecommitdiffstats
path: root/ausarbeitung/literature.bib.backup
blob: 904da8b4909ceb449e67e029ce7db387dfbbbf36 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
@misc{IRC,
title = {RFC 1459 Internet Relay Chat},
author = {J. Oikarinen and D. Reed},
year = {2003},
}

@misc{Base64,
title = {RFC 4648},
author = {S. Josefsson},
year = {2006},
}

@article{SPALS,
title = {Spontaneous Privacy-Aware Location Sharing},
author = {K. Welke and K. Rechert},
journal= {In proceedings of the 4th International Conference on Pervasive Computing and Applications (ICPCA 2009)},
year = {2009},
}

@article{privacy,
title = {Location privacy and locationaware computing},
author = {M. Duckham and L. Kulik},
journal = {Dynamic and mobile GIS: investigating change in space and time},
year = {2006},
pages = {34-51},
}

@article{bluetooth,
title = {Cracking the Bluetooth PIN},
author = {Y. Shaked and A. Wool},
journal = {Proceedings of the 3rd international conference on Mobile systems, applications, and services},
organization= {School of Electrical Engineering Systems Tel Aviv University},
year = {2005},
pages = {39-50},
}

@article{blowfish,
title = {Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish)},
author = {B. Schneier},
year = {1994},
journal = {Fast Software Encryption, Cambridge Security Workshop Proceedings},
pages = {191-204},
}

@article{kprivacy,
title = {Anonymous usage of location based services through spatial and temporal cloacking},
author = {M. Gruteser and D. Grunwald},
year = {2003},
journal = {Proceedings of the 1st international conference on Mobile systems, applications and services},
pages = {31-42},
}

@article{kanonymity,
title = {k-Anonymity},
author = {V. Ciriani and S. De Capitani di Vimercati and S. Foresti and P. Samarati},
year = {2007},
journal = {Secure Data Management in Decentralized Systems},
pages = {323-353},
}

@article{quadtree,
title = {The Quadtree and Related Hierarchical Data Structures},
author = {H. Samet},
year = {1984},
journal = {ACM Computing Surveys (CSUR)},
pages = {187-260},
volume = {Volume 16},
}

@article{dummy,
title = {An anonymous communication technique using dummies for location-based services},
author = {H. Kido and Y. Yanagisawa and T. Satoh},
year = {2005},
journal = {ICPS '05. Proceedings. International Conference on Pervasive Services},
pages = {88-97},
}

@article{geocaching,
title = {Geocaching: hike and seek with your GPS.},
author = {E. Sherman},
year = {2005},
journal = {Computing Reviews},
volume = {Volume 46},
number = {2},
}

@article{symm,
author = {G. Müller},
title = {Vorlesung IT-Sicherheit},
year = {2009},
pages = {17-18},
}