summaryrefslogtreecommitdiffstats
path: root/ausarbeitung/literature.bib
blob: ee9fcd48519a73c4035be6a413942348233f42bd (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
@misc{IRC,
title = {RFC 1459 Internet Relay Chat},
author = {J. Oikarinen and D. Reed},
year = {2003},
}

@misc{SPALS,
title = {Spontaneous Privacy-Aware Location Sharing},
author = {Konstantin Welke and Klaus Rechert},
organization= {Lehrstuhl für Kommunikationssysteme, Albert-Ludwigs Universität Freiburg},
year = {2009},
}

@article{privacy,
title = {Location privacy and locationaware computing},
author = {Matt Duckham and Lars Kulik},
journal = {Dynamic and mobile GIS: investigating change in space and time},
year = {2006},
pages = {34-51},
}

@article{bluetooth,
title = {Cracking the Bluetooth PIN},
author = {Yaniv Shaked and Avishai Wool},
journal = {Proceedings of the 3rd international conference on Mobile systems, applications, and services},
organization= {School of Electrical Engineering Systems Tel Aviv University},
year = {2005},
pages = {39-50},
}

@article{blowfish,
title = {Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish)},
author = {Bruce Schneier},
year = {1994},
journal = {Fast Software Encryption, Cambridge Security Workshop Proceedings},
pages = {191-204},
}

@article{kprivacy,
title = {Anonymous usage of location based services through spatial and temporal cloacking},
author = {Marco Gruteser and Dirk Grunwald},
year = {2003},
journal = {Proceedings of the 1st international conference on Mobile systems, applications and services},
pages = {31-42},
}

@article{kanonymity,
title = {k-Anonymity},
author = {Valentina Ciriani and Sabrina De Capitani di Vimercati and Sara Foresti and Pierangela Samarati},
year = {2007},
journal = {Secure Data Management in Decentralized Systems},
pages = {323-353},
}

@article{quadtree,
title = {The Quadtree and Related Hierarchical Data Structures},
author = {Hanan Samet},
year = {1984},
journal = {ACM Computing Surveys (CSUR)},
pages = {187-260},
volume = {Volume 16},
}

@article{dummy,
title = {An anonymous communication technique using dummies for location-based services},
author = {Hidetoshi Kido and Yutaka Yanagisawa and Tetsuji Satoh},
year = {2005},
journal = {ICPS '05. Proceedings. International Conference on Pervasive Services},
pages = {88-97},
}

@article{geocaching,
title = {Geocaching: hike and seek with your GPS.},
author = {Erik Sherman},
year = {2005},
journal = {Computing Reviews},
volume = {Volume 46},
number = {2},
}

@article{symm,
author = {Günter Müller},
howpublished = {Vorlesung IT-Sicherheit},
year = {2009},
page = {17-18},
}