iPass Wi-Fi growth map shows 1 public hotspot for every 20 people on earth by, 2014. ,
Global broadband and WLAN (Wi-Fi) networked households forecast, 2009. ,
Location strategies, 2015. ,
Understanding location services, 2015. ,
Short paper, Proceedings of the 2014 ACM conference on Security and privacy in wireless & mobile networks, WiSec '14, 2014. ,
DOI : 10.1145/2627393.2627399
URL : https://hal.archives-ouvertes.fr/hal-00997716
A measurement study of tracking in paid mobile applications, Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, WiSec '15, 2015. ,
DOI : 10.1145/2766498.2766523
Can Ferris Bueller Still Have His Day Off? Protecting Privacy in the Wireless Era, HotOS, 2007. ,
I know who you will meet this evening! Linking wireless devices using Wi-Fi probe requests, 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2012. ,
DOI : 10.1109/WoWMoM.2012.6263700
URL : https://hal.archives-ouvertes.fr/hal-00747825
Inferring user relationship from hidden information in WLANs, MILCOM 2012, 2012 IEEE Military Communications Conference, 2012. ,
DOI : 10.1109/MILCOM.2012.6415713
URL : https://hal.archives-ouvertes.fr/hal-00747850
Instrumenting the city: Developing methods for observing and understanding the digital cityscape, UbiComp, 2006. ,
Merolyn the Phone": A Study of Bluetooth Naming Practices, UbiComp, 2007. ,
Device Names in the Wild: Investigating Privacy Risks of Zero Configuration Networking, 2013 IEEE 14th International Conference on Mobile Data Management, 2013. ,
DOI : 10.1109/MDM.2013.65
Interpreting technology-mediated identity, Proceedings of the 22nd Conference of the Computer-Human Interaction Special Interest Group of Australia on Computer-Human Interaction, OZCHI '10, 2010. ,
DOI : 10.1145/1952222.1952273
Loli: I Love It, I Live with It " : Exploring the practice of nicknaming mobile phones, Human IT, vol.12, issue.02, 2013. ,
Sociotechnical study on the effect of trust and context when choosing WiFi names, Security and Trust Management, 2013. ,