. Brickstream-privacy and . Matters, http://brickstream.com/live/privacy-matters

E. Analytics-privacy and . Statement, eyeQ -Privacy Policy. http://www.eyeqinsights.com/?page id=183

. Navizon-privacy, http://support.navizon.com/are- there-any-security-and-data-privacy-concerns-when- using-navizon-products

. Nomi-privacy, Radius Networks Privacy Policy

R. Policy, http://retailnext.net/policies/privacy-policy/. [17] Solomo -Privacy Policy

J. Bonneau, The Science of Guessing: Analyzing an Anonymized Corpus of 70 Million Passwords, 2012 IEEE Symposium on Security and Privacy, pp.538-552, 2012.
DOI : 10.1109/SP.2012.49

M. Mathieu-cunche, R. Kaafar, and . Boreli, Linking wireless devices using information contained in Wi-Fi probe requests, Pervasive and Mobile Computing, vol.11, issue.0, pp.56-69, 2014.
DOI : 10.1016/j.pmcj.2013.04.001

C. Anthony, J. Davies, S. A. Hong-yin, and . Velastin, Crowd monitoring using image processing, Electronics & Communication Engineering Journal, vol.7, issue.1, pp.37-47, 1995.

H. De-montjoye-yves-alexandre, A. Cesar, V. Michel, and D. Vincent, Unique in the Crowd: The privacy bounds of human mobility

B. Greenstein, R. Gummadi, J. Pang, M. Y. Chen, T. Kohno et al., Can Ferris Bueller still have his day off? protecting privacy in the wireless era, Proceedings of the 11th USENIX workshop on Hot topics in operating systems, pp.1-10, 2007.

P. Leach, M. Mealling, and R. Salz, RFC 4122: A Universally Unique IDentifier (UUID) URN Namespace, 2005.

J. L. Massey, Guessing and entropy, Proceedings of 1994 IEEE International Symposium on Information Theory, p.204, 1994.
DOI : 10.1109/ISIT.1994.394764

A. B. Musa and J. Eriksson, Tracking unmodified smartphones using wi-fi monitors, Proceedings of the 10th ACM Conference on Embedded Network Sensor Systems, SenSys '12, pp.281-294
DOI : 10.1145/2426656.2426685

P. Future and . Forum, Mobile Location Analytics Code of Conduct, 2013.

C. Percival, Stronger Key Derivation via Sequential Memory-Hard Functions, USENIX Annual Technical Conference, FREENIX Track, 2009.

N. Provos and D. Eres, A Future-Adaptable Password Scheme, USENIX Annual Technical Conference, FREENIX Track, pp.81-91, 1999.

J. Steube, hashcat advanced password recovery, 2014.