599
edits
(→Topics) |
(→Topics) |
||
Line 48: | Line 48: | ||
| [http://dl.acm.org/citation.cfm?id=1613982] [http://dl.acm.org/citation.cfm?id=2043981&CFID=115044559&CFTOKEN=88700437] [http://dl.acm.org/citation.cfm?id=2037399] | | [http://dl.acm.org/citation.cfm?id=1613982] [http://dl.acm.org/citation.cfm?id=2043981&CFID=115044559&CFTOKEN=88700437] [http://dl.acm.org/citation.cfm?id=2037399] | ||
|- | |- | ||
| Preserving Location Privacy in Wireless Mobile Networks | | <strike>Preserving Location Privacy in Wireless Mobile Networks</strike> (Assigned to Md Istiak Mehedi) | ||
| [http://www.net.informatik.uni-goettingen.de/people/wenzhong_li Dr. Wenzhong Li] | | [http://www.net.informatik.uni-goettingen.de/people/wenzhong_li Dr. Wenzhong Li] | ||
| [http://arbor.ee.ntu.edu.tw/archive/ppdm/Anonymity/SweeneyKA02.pdf] [http://synrg.ee.duke.edu/papers/cachecloak.pdf] [http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1437123&tag=1] | | [http://arbor.ee.ntu.edu.tw/archive/ppdm/Anonymity/SweeneyKA02.pdf] [http://synrg.ee.duke.edu/papers/cachecloak.pdf] [http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1437123&tag=1] | ||
|- | |- | ||
| <strike>Indoor Localization for Mobile Devices</strike> (Assigned to Bartosz) | | <strike>Indoor Localization for Mobile Devices</strike> (Assigned to Bartosz Kohnke) | ||
| [http://www.net.informatik.uni-goettingen.de/people/wenzhong_li Dr. Wenzhong Li] | | [http://www.net.informatik.uni-goettingen.de/people/wenzhong_li Dr. Wenzhong Li] | ||
| [http://dl.acm.org/citation.cfm?id=2348581] [http://dl.acm.org/citation.cfm?id=2348579] [http://dl.acm.org/citation.cfm?id=2348578][http://dl.acm.org/citation.cfm?id=2348580] | | [http://dl.acm.org/citation.cfm?id=2348581] [http://dl.acm.org/citation.cfm?id=2348579] [http://dl.acm.org/citation.cfm?id=2348578][http://dl.acm.org/citation.cfm?id=2348580] | ||
Line 60: | Line 60: | ||
| [http://astro.temple.edu/~tuc13642/file/Infocom%2012.pdf] [http://www.cs.rpi.edu/~szymansk/papers/tpds.12.pdf] [http://www.cl.cam.ac.uk/~ph315/publications/hoc86309-hui.pdf] | | [http://astro.temple.edu/~tuc13642/file/Infocom%2012.pdf] [http://www.cs.rpi.edu/~szymansk/papers/tpds.12.pdf] [http://www.cl.cam.ac.uk/~ph315/publications/hoc86309-hui.pdf] | ||
|- | |- | ||
| <strike>Sybil Attacks and Defense via Social Networks: A good Idea?</strike> (Assigned to Subhash) | | <strike>Sybil Attacks and Defense via Social Networks: A good Idea?</strike> (Assigned to Subhash Chandra Pujari) | ||
| [http://www.net.informatik.uni-goettingen.de/people/david_koll David Koll] | | [http://www.net.informatik.uni-goettingen.de/people/david_koll David Koll] | ||
| [http://www.mpi-soft.mpg.de/~gummadi/papers/comm318g.pdf] [http://www.mpi-sws.org/~gummadi/papers/sybil_defense.pdf] [http://www.cs.ucsb.edu/~ravenben/publications/pdf/sybil-imc11.pdf] | | [http://www.mpi-soft.mpg.de/~gummadi/papers/comm318g.pdf] [http://www.mpi-sws.org/~gummadi/papers/sybil_defense.pdf] [http://www.cs.ucsb.edu/~ravenben/publications/pdf/sybil-imc11.pdf] | ||
|- | |- | ||
| Bitcoins: A new currency? | | <strike>Bitcoins: A new currency?</strike> (Assigned to Daniel Schulenburg) | ||
| [http://www.net.informatik.uni-goettingen.de/people/david_koll David Koll] | | [http://www.net.informatik.uni-goettingen.de/people/david_koll David Koll] | ||
| [http://en.wikipedia.org/wiki/Bitcoin] | | [http://en.wikipedia.org/wiki/Bitcoin] |
edits