J. P. Achara, M. Cunche, V. Roca, and A. Francillon, WifiLeaks: Underestimated Privacy Implications of the ACCESS WIFI STATE Android Permission, INRIA Research Report, vol.8539, 2014.
URL : https://hal.archives-ouvertes.fr/hal-00994926

J. R. Blum, D. G. Greencorn, and J. R. Cooperstock, Smartphone Sensor Reliability for Augmented Reality Applications, Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2013.
DOI : 10.1111/j.1467-9671.2009.01152.x

T. Book, A. Pridgen, and D. S. Wallach, Longitudinal analysis of android ad library permissions, 2013.

J. Cowie and W. Lehnert, Information extraction, Communications of the ACM, vol.39, issue.1, 1996.
DOI : 10.1145/234173.234209

M. Cunche, M. Kaafar, and R. Boreli, Linking wireless devices using information contained in Wi-Fi probe requests, Pervasive and Mobile Computing, vol.11, 2013.
DOI : 10.1016/j.pmcj.2013.04.001

URL : https://hal.archives-ouvertes.fr/hal-00816374

C. Daniel and W. Glenn, Snoopy: Distributed tracking and profiling framework, 2012.

A. P. Felt, E. Ha, S. Egelman, A. Haney, E. Chin et al., Android permissions, Proceedings of the Eighth Symposium on Usable Privacy and Security, SOUPS '12
DOI : 10.1145/2335356.2335360

B. Greenstein, R. Gummadi, J. Pang, M. Y. Chen, T. Kohno et al., Can Ferris Bueller still have his day off? protecting privacy in the wireless era, USENIX HotOS workshop, 2007.

A. Lamarca, Y. Chawathe, S. Consolvo, J. Hightower, I. Smith et al., Place Lab: Device Positioning Using Radio Beacons in the Wild, Pervasive computing, 2005.
DOI : 10.1007/11428572_8

J. Lindqvist, T. Aura, G. Danezis, T. Koponen, A. Myllyniemi et al., Privacy-preserving 802.11 access-point discovery, Proceedings of the second ACM conference on Wireless network security, WiSec '09, 2009.
DOI : 10.1145/1514274.1514293

A. B. Musa and J. Eriksson, Tracking unmodified smartphones using wi-fi monitors, Proceedings of the 10th ACM Conference on Embedded Network Sensor Systems, SenSys '12, 2012.
DOI : 10.1145/2426656.2426685

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.423.2431

X. Zhou, S. Demetriou, D. He, M. Naveed, X. Pan et al., Identity, location, disease and more, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13
DOI : 10.1145/2508859.2516661