Seminar on Internet Technologies (Summer 2013): Difference between revisions

Line 48: Line 48:
| [http://dl.acm.org/citation.cfm?id=1613982] [http://dl.acm.org/citation.cfm?id=2043981&CFID=115044559&CFTOKEN=88700437] [http://dl.acm.org/citation.cfm?id=2037399]
| [http://dl.acm.org/citation.cfm?id=1613982] [http://dl.acm.org/citation.cfm?id=2043981&CFID=115044559&CFTOKEN=88700437] [http://dl.acm.org/citation.cfm?id=2037399]
|-
|-
| Preserving Location Privacy in Wireless Mobile Networks  
| <strike>Preserving Location Privacy in Wireless Mobile Networks</strike> (Assigned to Md Istiak Mehedi)
| [http://www.net.informatik.uni-goettingen.de/people/wenzhong_li Dr. Wenzhong Li]
| [http://www.net.informatik.uni-goettingen.de/people/wenzhong_li Dr. Wenzhong Li]
| [http://arbor.ee.ntu.edu.tw/archive/ppdm/Anonymity/SweeneyKA02.pdf] [http://synrg.ee.duke.edu/papers/cachecloak.pdf] [http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1437123&tag=1]
| [http://arbor.ee.ntu.edu.tw/archive/ppdm/Anonymity/SweeneyKA02.pdf] [http://synrg.ee.duke.edu/papers/cachecloak.pdf] [http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1437123&tag=1]
|-
|-
| <strike>Indoor Localization for Mobile Devices</strike> (Assigned to Bartosz)
| <strike>Indoor Localization for Mobile Devices</strike> (Assigned to Bartosz Kohnke)
| [http://www.net.informatik.uni-goettingen.de/people/wenzhong_li Dr. Wenzhong Li]
| [http://www.net.informatik.uni-goettingen.de/people/wenzhong_li Dr. Wenzhong Li]
| [http://dl.acm.org/citation.cfm?id=2348581] [http://dl.acm.org/citation.cfm?id=2348579] [http://dl.acm.org/citation.cfm?id=2348578][http://dl.acm.org/citation.cfm?id=2348580]
| [http://dl.acm.org/citation.cfm?id=2348581] [http://dl.acm.org/citation.cfm?id=2348579] [http://dl.acm.org/citation.cfm?id=2348578][http://dl.acm.org/citation.cfm?id=2348580]
Line 60: Line 60:
| [http://astro.temple.edu/~tuc13642/file/Infocom%2012.pdf] [http://www.cs.rpi.edu/~szymansk/papers/tpds.12.pdf] [http://www.cl.cam.ac.uk/~ph315/publications/hoc86309-hui.pdf]
| [http://astro.temple.edu/~tuc13642/file/Infocom%2012.pdf] [http://www.cs.rpi.edu/~szymansk/papers/tpds.12.pdf] [http://www.cl.cam.ac.uk/~ph315/publications/hoc86309-hui.pdf]
|-
|-
| <strike>Sybil Attacks and Defense via Social Networks: A good Idea?</strike> (Assigned to Subhash)
| <strike>Sybil Attacks and Defense via Social Networks: A good Idea?</strike> (Assigned to Subhash Chandra Pujari)
| [http://www.net.informatik.uni-goettingen.de/people/david_koll David Koll]
| [http://www.net.informatik.uni-goettingen.de/people/david_koll David Koll]
| [http://www.mpi-soft.mpg.de/~gummadi/papers/comm318g.pdf] [http://www.mpi-sws.org/~gummadi/papers/sybil_defense.pdf] [http://www.cs.ucsb.edu/~ravenben/publications/pdf/sybil-imc11.pdf]
| [http://www.mpi-soft.mpg.de/~gummadi/papers/comm318g.pdf] [http://www.mpi-sws.org/~gummadi/papers/sybil_defense.pdf] [http://www.cs.ucsb.edu/~ravenben/publications/pdf/sybil-imc11.pdf]
|-
|-
| Bitcoins: A new currency?
| <strike>Bitcoins: A new currency?</strike> (Assigned to Daniel Schulenburg)
| [http://www.net.informatik.uni-goettingen.de/people/david_koll David Koll]
| [http://www.net.informatik.uni-goettingen.de/people/david_koll David Koll]
| [http://en.wikipedia.org/wiki/Bitcoin]
| [http://en.wikipedia.org/wiki/Bitcoin]
599

edits