summaryrefslogtreecommitdiffstats
path: root/ausarbeitung/maindoc.bbl
blob: 6ea870415d114f248bd2664e0259a858358959e8 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
\begin{thebibliography}{10}

\bibitem{kanonymity}
Valentina Ciriani, Sabrina De~Capitani di~Vimercati, Sara Foresti, and
  Pierangela Samarati.
\newblock k-anonymity.
\newblock {\em Secure Data Management in Decentralized Systems}, pages
  323--353, 2007.

\bibitem{privacy}
Matt Duckham and Lars Kulik.
\newblock Location privacy and locationaware computing.
\newblock {\em Dynamic and mobile GIS: investigating change in space and time},
  pages 34--51, 2006.

\bibitem{kprivacy}
Marco Gruteser and Dirk Grunwald.
\newblock Anonymous usage of location based services through spatial and
  temporal cloacking.
\newblock {\em Proceedings of the 1st international conference on Mobile
  systems, applications and services}, pages 31--42, 2003.

\bibitem{dummy}
Hidetoshi Kido, Yutaka Yanagisawa, and Tetsuji Satoh.
\newblock An anonymous communication technique using dummies for location-based
  services.
\newblock {\em ICPS '05. Proceedings. International Conference on Pervasive
  Services}, pages 88--97, 2005.

\bibitem{symm}
Günter Müller.
\newblock 2009.

\bibitem{IRC}
J.~Oikarinen and D.~Reed.
\newblock Rfc 1459 internet relay chat, 2003.

\bibitem{quadtree}
Hanan Samet.
\newblock The quadtree and related hierarchical data structures.
\newblock {\em ACM Computing Surveys (CSUR)}, Volume 16:187--260, 1984.

\bibitem{blowfish}
Bruce Schneier.
\newblock Description of a new variable-length key, 64-bit block cipher
  (blowfish).
\newblock {\em Fast Software Encryption, Cambridge Security Workshop
  Proceedings}, pages 191--204, 1994.

\bibitem{bluetooth}
Yaniv Shaked and Avishai Wool.
\newblock Cracking the bluetooth pin.
\newblock {\em Proceedings of the 3rd international conference on Mobile
  systems, applications, and services}, pages 39--50, 2005.

\bibitem{geocaching}
Erik Sherman.
\newblock Geocaching: hike and seek with your gps.
\newblock {\em Computing Reviews}, Volume 46(2), 2005.

\bibitem{SPALS}
Konstantin Welke and Klaus Rechert.
\newblock Spontaneous privacy-aware location sharing, 2009.

\end{thebibliography}