M. V. Barbera, A. Epasto, A. Mei, S. Kosta, V. C. Perta et al., CRAWDAD dataset sapienza/probe-requests (v. 2013-09-10) Retrieved 10

B. Bloessl, M. Segata, C. Sommer, and F. Dressler, 11 a/g/p OFDM receiver for GNU radio, SRIF Workshop, 2013.

B. Bloessl, C. Sommer, F. Dressler, and D. Eckhoff, The scrambler attack: A robust physical layer attack on location privacy in vehicular networks, 2015 International Conference on Computing, Networking and Communications (ICNC), 2015.
DOI : 10.1109/ICCNC.2015.7069376

V. Brik, S. Banerjee, M. Gruteser, and S. Oh, Wireless device identification with radiometric signatures, Proceedings of the 14th ACM international conference on Mobile computing and networking, MobiCom '08, 2008.
DOI : 10.1145/1409944.1409959

P. O. Carlos, J. C. Bernardos, and . Zú´zú´niga, Wi-Fi internet connectivity and privacy: hiding your tracks on the wireless internet, IEEE CSCN, 2015.

. Chainfire and . Pry-fi, Retrieved from https

M. Cristea and B. Groza, Fingerprinting Smartphones Remotely via ICMP Timestamps, IEEE Communications Letters, vol.17, issue.6, pp.1081-1083, 2013.
DOI : 10.1109/LCOMM.2013.040913.130419

D. A. Dai-zovi and S. Macaulay, Attacking automatic wireless network selection, Proceedings from the Sixth Annual IEEE Systems, Man and Cybernetics (SMC) Information Assurance Workshop, 2005., 2005.
DOI : 10.1109/IAW.2005.1495975

B. Danev, D. Zanetti, and S. Capkun, On physical-layer identification of wireless devices, ACM Computing Surveys, vol.45, issue.1, p.6, 2012.
DOI : 10.1145/2379776.2379782

C. Daniel and W. Glenn, Snoopy: Distributed tracking and profiling framework, 2012.

L. Demir, M. Cunche, and C. Lauradoux, Analysing the privacy policies of Wi-Fi trackers, Proceedings of the 2014 workshop on physical analytics, WPA '14, 2014.
DOI : 10.1145/2611264.2611266

URL : https://hal.archives-ouvertes.fr/hal-00983363

L. C. Desmond, C. C. Yuan, T. C. Pheng, and R. S. Lee, Identifying unique devices through wireless fingerprinting, Proceedings of the first ACM conference on Wireless network security , WiSec '08, 2008.
DOI : 10.1145/1352533.1352542

P. Eckersley, How unique is your web browser? In Privacy Enhancing Technologies, 2010.

J. Franklin, D. Mccoy, P. Tabriz, V. Neagoe, J. V. Randwyk et al., Passive data link layer 802.11 wireless device driver fingerprinting, USENIX Security, 2006.

J. Freudiger, How talkative is your mobile device? An experimental study of Wi-Fi probe requests, WiSec, 2015.

B. Gellman and A. Soltani, NSA tracking cellphone locations worldwide, Snowden documents show

M. X. Gong, B. Hart, L. Xia, and R. Want, Channel Bounding and MAC Protection Mechanisms for 802.11ac, 2011 IEEE Global Telecommunications Conference, GLOBECOM 2011, 2011.
DOI : 10.1109/GLOCOM.2011.6133869

F. Gont, A method for generating semantically opaque interface identifiers with ipv6 stateless address autoconfiguration (slaac). RFC 7217, 2014.

D. Goodin, No, this isn't a scene from minority report. This trash can is stalking you, Ars Technica, 2013.

B. Greenstein, R. Gummadi, J. Pang, M. Y. Chen, T. Kohno et al., Can Ferris Bueller still have his day off? protecting privacy in the wireless era, USENIX HotOS, 2007.

E. Grumbach, iwlwifi: mvm: support random MAC address for scanning, Linux commit effd05ac479b

M. Gruteser and D. Grunwald, Enhancing location privacy in wireless LAN through disposable interface identifiers, Proceedings of the 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots , WMASH '03, pp.315-325, 2005.
DOI : 10.1145/941326.941334

F. Guo and T. Chiueh, Sequence Number-Based MAC Address Spoof Detection, RAID, 2006.
DOI : 10.1007/11663812_16

C. Huitema, Experience with MAC address randomization in Windows 10, 93th Internet Engineering Task Force Meeting (IETF), 2015.

M. Humbert, M. H. Manshaei, J. Freudiger, and J. Hubaux, Tracking Games in Mobile Networks, Conf. on Decision and Game Theory for Security, 2010.
DOI : 10.1007/978-3-642-17197-0_3

N. Husted and S. Myers, Mobile location tracking in metro areas, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, 2010.
DOI : 10.1145/1866307.1866318

S. Jana and S. K. Kasera, On fast and accurate detection of unauthorized wireless access points using clock skews, Proceedings of the 14th ACM international conference on Mobile computing and networking, MobiCom '08, 2008.
DOI : 10.1145/1409944.1409958

P. Leach, M. Mealling, and R. Salz, A universally unique identifier (UUID) URN namespace, RFC, vol.4122, 2005.
DOI : 10.17487/rfc4122

J. Lindqvist, T. Aura, G. Danezis, T. Koponen, A. Myllyniemi et al., Privacy-preserving 802.11 access-point discovery, Proceedings of the second ACM conference on Wireless network security, WiSec '09, 2009.
DOI : 10.1145/1514274.1514293

B. Misra, iOS 8 MAC randomization ? analyzed! http://blog.airtightnetworks.com/ios8-mac- randomization-analyzed

A. B. Musa and J. Eriksson, Tracking unmodified smartphones using wi-fi monitors, Proceedings of the 10th ACM Conference on Embedded Network Sensor Systems, SenSys '12, 2012.
DOI : 10.1145/2426656.2426685

B. O. Connor, CreepyDOL: Cheap, distributed stalking, BlackHat, 2013.

J. Pang, B. Greenstein, R. Gummadi, S. Seshan, and D. Wetherall, 11 user fingerprinting, MobiCom, 2007.

J. Pang, B. Greenstein, S. Seshan, and D. Wetherall, Tryst: The case for confidential service discovery, HotNets, 2007.

J. Scahill and G. Greenwald, The NSA's secret role in the U.S. assassination program. The Intercept, 2014.

K. Skinner and J. Novak, Privacy and your app, Apple Worldwide Dev. Conf. (WWDC), 2015.

T. Stöber, M. Frank, J. Schmitt, and I. Martinovic, Who do you sync you are?, Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks, WiSec '13, 2013.
DOI : 10.1145/2462096.2462099

L. Wang and C. Tellambura, An Overview of Peak-to-Average Power Ratio Reduction Techniques for OFDM Systems, 2006 IEEE International Symposium on Signal Processing and Information Technology, 2006.
DOI : 10.1109/ISSPIT.2006.270915

W. Wang, Wireless networking in Windows 10, Windows Hardware Engineering Community conference (WinHEC), 2015.

. Wi-fi-alliance, Wi-Fi Simple Configuration Protocol and Usability Best Practices for the Wi-Fi Protected Setup Program, 2011.