summaryrefslogtreecommitdiffstats
path: root/ausarbeitung/maindoc.bbl
blob: b9761a7a6d65c2d984750687a51344a4de0f413d (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
\begin{thebibliography}{10}

\bibitem{kanonymity}
V.~Ciriani, S.~De~Capitani di~Vimercati, S.~Foresti, and P.~Samarati.
\newblock {k-Anonymity}.
\newblock {\em Secure Data Management in Decentralized Systems}, pages
  323--353, 2007.

\bibitem{privacy}
M.~Duckham and L.~Kulik.
\newblock Location privacy and locationaware computing.
\newblock {\em Dynamic and mobile GIS: investigating change in space and time},
  pages 34--51, 2006.

\bibitem{kprivacy}
M.~Gruteser and D.~Grunwald.
\newblock {Anonymous usage of location based services through spatial and
  temporal cloacking}.
\newblock {\em Proceedings of the 1st international conference on Mobile
  systems, applications and services}, pages 31--42, 2003.

\bibitem{Base64}
S.~Josefsson.
\newblock {RFC 4648 The Base16, Base32, and Base64 Data Encodings}.
\newblock 2006.

\bibitem{dummy}
H.~Kido, Y.~Yanagisawa, and T.~Satoh.
\newblock An anonymous communication technique using dummies for location-based
  services.
\newblock {\em ICPS '05. Proceedings. International Conference on Pervasive
  Services}, pages 88--97, 2005.

\bibitem{IRC}
J.~Oikarinen and D.~Reed.
\newblock {RFC 1459 Internet Relay Chat}.
\newblock 2003.

\bibitem{quadtree}
H.~Samet.
\newblock {The Quadtree and Related Hierarchical Data Structures}.
\newblock {\em ACM Computing Surveys (CSUR)}, Volume 16:187--260, 1984.

\bibitem{blowfish}
B.~Schneier.
\newblock Description of a new variable-length key, 64-bit block cipher
  (blowfish).
\newblock {\em Fast Software Encryption, Cambridge Security Workshop
  Proceedings}, pages 191--204, 1994.

\bibitem{bluetooth}
Y.~Shaked and A.~Wool.
\newblock Cracking the bluetooth pin.
\newblock {\em Proceedings of the 3rd international conference on Mobile
  systems, applications, and services}, pages 39--50, 2005.

\bibitem{geocaching}
E.~Sherman.
\newblock {Geocaching: hike and seek with your GPS.}
\newblock {\em Computing Reviews}, Volume 46(2), 2005.

\bibitem{SPALS}
K.~Welke and K.~Rechert.
\newblock {Spontaneous Privacy-Aware Location Sharing}.
\newblock {\em In proceedings of the 4th International Conference on Pervasive
  Computing and Applications (ICPCA 2009)}, 2009.

\end{thebibliography}