A. Acquisti, Privacy and Security of Personal Information, Economics of Information Security of Advances in Information Security, pp.179-186, 2004.
DOI : 10.1007/1-4020-8090-5_14

A. Aziz and W. Diffie, Privacy and authentication for wireless local area networks, IEEE Personal Communications, vol.1, issue.1, pp.25-31, 1994.
DOI : 10.1109/98.295357

J. Black, M. Cochran, and T. Highland, A Study of the MD5 Attacks: Insights and Improvements, Proceedings of the 13th international conference on Fast Software Encryption, FSE'06, pp.262-277, 2006.
DOI : 10.1007/11799313_17

M. Mathieu-cunche, R. Kaafar, and . Boreli, Linking wireless devices using information contained in Wi-Fi probe requests, Pervasive and Mobile Computing, issue.0, 2013.

P. Hawkes, M. Paddon, and G. G. Rose, Musings on the wang et al. md5 collision. Cryptology ePrint Archive, Report, vol.264, 2004.

V. Klima, Tunnels in hash functions: Md5 collisions within a minute, Cryptology ePrint Archive Report, vol.105, 2006.

R. Lim, Parallelization of john the ripper (jtr) using mpi, 2004.

R. Canetti, M. Bellare, and H. Krawczyk, Message authentication using hash functions: The HMAC construction, RSA Laboratories' CryptoBytes, 1996.

M. A. , K. Mathieu-cunche, and R. Boreli, I know who you will meet this evening, IEEE WoWMoM, 2012.

A. B. Musa and J. Eriksson, Tracking unmodified smartphones using wi-fi monitors, Proceedings of the 10th ACM Conference on Embedded Network Sensor Systems, SenSys '12, pp.281-294
DOI : 10.1145/2426656.2426685

A. Narayanan, Fast dictionary attacks on passwords using time-space tradeoff, Proceedings of the 12th ACM conference on Computer and communications security , CCS '05, pp.364-372, 2005.
DOI : 10.1145/1102120.1102168

. Navizon, Measuring crowds or people counting: What is the difference?, 2012.

C. Percival, Stronger Key Derivation via Sequential Memory-Hard Functions, USENIX Annual Technical Conference, FREENIX Track, 2009.

N. Provos and D. Mazières, A Future-Adaptable Password Scheme, USENIX Annual Technical Conference, FREENIX Track, pp.81-91, 1999.

R. Rivest, The md5 message-digest algorithm, 1992.
DOI : 10.17487/rfc1321

Y. Sasaki and K. Aoki, Finding Preimages in Full MD5 Faster Than Exhaustive Search, Advances in Cryptology -EUROCRYPT 2009, pp.134-152, 2009.
DOI : 10.1007/11426639_2

B. Schilit, J. Hong, and M. Gruteser, Wireless location privacy protection, Computer, vol.36, issue.12, pp.135-137, 2003.
DOI : 10.1109/MC.2003.1250896

X. Wang, Y. Yin, and H. Yu, Finding Collisions in the Full SHA-1, Advances in Cryptology -CRYPTO 2005, pp.17-36, 2005.
DOI : 10.1007/11535218_2