J. Achara, J. Prasad, V. Lefruit, C. Roca, and . Castelluccia, Detecting privacy leaks in the RATP App: how we proceeded and what we found, GREHACK 2013 Guillaume Jeanne. to appear also in Springer Journal of Computer Virology and Hacking Techniques (JCVHT), 2013.
DOI : 10.1007/s11416-013-0197-0

URL : https://hal.archives-ouvertes.fr/hal-00872967

B. Bonne, A. Barzan, P. Quax, and W. Lamotte, WiFiPi: Involuntary tracking of visitors at mass events, 2013 IEEE 14th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM), pp.1-6, 2013.
DOI : 10.1109/WoWMoM.2013.6583443

M. Cunche, I know your MAC address: targeted tracking of individual using Wi-Fi, International Symposium on Research in Grey-Hat Hacking -GreHack, 2013.
DOI : 10.1007/s11416-013-0196-1

URL : https://hal.archives-ouvertes.fr/hal-00858324

M. A. Mathieu-cunche, R. Kaafar, and . Boreli, I know who you will meet this evening! Linking wireless devices using Wi-Fi probe requests, WoWMoM -13th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks -2012, 2012.

M. Mathieu-cunche, R. Kaafar, and . Boreli, Linking wireless devices using information contained in Wi-Fi probe requests, Pervasive and Mobile Computing, issue.0, 2013.

C. Daniel and W. Glenn, Snoopy: Distributed tracking and profiling framework, 2012.

P. Golle and K. Partridge, On the Anonymity of Home/Work Location Pairs, Proceedings of the 7th International Conference on Pervasive Computing, Pervasive '09, pp.390-397, 2009.
DOI : 10.1007/978-3-642-01516-8_26

J. Lindqvist, T. Aura, G. Danezis, T. Koponen, A. Myllyniemi et al., Privacy-preserving 802.11 access-point discovery, Proceedings of the second ACM conference on Wireless network security, WiSec '09, pp.123-130, 2009.
DOI : 10.1145/1514274.1514293

O. Brendan and . Connor, CreepyDOL: Cheap, Distributed Stalking, Black- Hat, 2013.