G. Acar, C. Eubank, S. Englehardt, M. Juarez, A. Narayanan et al., The Web Never Forgets, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, pp.674-689, 2014.
DOI : 10.1145/2660267.2660347

J. P. Achara, G. Acs, and C. Castelluccia, On the Unicity of Smartphone Applications, Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society, WPES '15, pp.27-36, 2015.
DOI : 10.1145/2808138.2808146

URL : https://hal.archives-ouvertes.fr/hal-01181040

K. Boda, A. M. Földes, G. G. Gulyás, and S. Imre, User Tracking on the Web via Cross-Browser Fingerprinting, Lecture Notes in Computer Science, vol.7161, pp.31-46, 2012.
DOI : 10.1007/978-3-642-29615-4_4

T. Bujlow, V. Carela-espanol, J. Sole-pareta, and P. Barlet-ros, A Survey on Web Tracking: Mechanisms, Implications, and Defenses, Proceedings of the IEEE, 2015.
DOI : 10.1109/JPROC.2016.2637878

X. Cai, X. C. Zhang, B. Joshi, and R. Johnson, Touching from a distance, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, 2012.
DOI : 10.1145/2382196.2382260

C. Chekuri and A. Kumar, Maximum Coverage Problem with Group Budget Constraints and Applications, Approximation , Randomization, and Combinatorial Optimization, pp.72-83, 2004.
DOI : 10.1007/978-3-540-27821-4_7

Y. De-montjoye, C. A. Hidalgo, M. Verleysen, and V. D. Blondel, Unique in the Crowd: The privacy bounds of human mobility, Scientific Reports, vol.23, 2013.
DOI : 10.1038/srep01376

Y. De-montjoye, L. Radaelli, V. K. Singh, and A. Pentland, Unique in the shopping mall: On the reidentifiability of credit card metadata, Science, vol.347, issue.6221, p.347, 2015.
DOI : 10.1126/science.1256297

P. Eckersley, How Unique Is Your Web Browser?, Proceedings of the 10th International Conference on Privacy Enhancing Technologies, pp.1-18, 2010.
DOI : 10.1007/978-3-642-14527-8_1

P. Eckersley, How Unique Is Your Web Browser?, Privacy Enhancing Technologies, pp.1-18, 2010.
DOI : 10.1007/978-3-642-14527-8_1

U. Feige, A threshold of ln n for approximating set cover, Journal of the ACM, vol.45, issue.4, pp.634-652, 1998.
DOI : 10.1145/285055.285059

. Gacar, Improve persistence and webfont compatibility of font patch, comment #13. https://trac.torproject.org/projects/ tor/ticket, p.13, 2013.

M. Graham and S. D. Sabbata, The anonymous internet, 2014.

G. G. Gulyás, G. Acs, and C. Castelluccia, Update your tor browser settings -otherwise it is less anonymous than you would think. https://gulyas.info/blog/read/16/2015-11- 30-Update-your-TOR-Browser-settings-otherwise-it-is-less- anonymous-than-you-would-think, p.2015

J. Hayes and G. Danezis, k-fingerprinting: a robust scalable website fingerprinting technique, 2015.

D. Lemire, L. Boytsov, and N. Kurz, SIMD compression and the intersection of sorted integers. CoRR, abs/1401, 2014.

J. Marshall, Twitter is tracking users' installed apps for ad targeting. http://blogs.wsj.com/cmotwitter- is-tracking-users-installed-apps-for-ad-targeting, p.2014, 2014.

E. C. Perry and S. Murdoch, The design and implementation of the tor browser [draft], p.2015

R. Motwani and Y. Xu, Efficient algorithms for masking and finding quasi-identifiers, VLDB, 2007.

G. Nemhauser, L. Wolsey, and M. Fisher, An analysis of approximations for maximizing submodular set functions???I, Mathematical Programming, vol.16, issue.1, pp.265-294, 1978.
DOI : 10.1007/BF01588971

N. Nikiforakis, A. Kapravelos, W. Joosen, C. Kruegel, F. Piessens et al., Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting, 2013 IEEE Symposium on Security and Privacy, pp.541-555, 2013.
DOI : 10.1109/SP.2013.43

L. Olejnik, C. Castelluccia, and A. Janc, On the uniqueness of Web browsing history patterns, annals of telecommunications - annales des t??l??communications, vol.1, issue.1-2, 2014.
DOI : 10.1007/s12243-013-0392-5

URL : https://hal.archives-ouvertes.fr/hal-00917042

A. J. Oliner, A. P. Iyer, I. Stoica, E. Lagerspetz, and S. Tarkoma, Carat, Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems, SenSys '13, 2013.
DOI : 10.1145/2517351.2517354

H. T. Truong, E. Lagerspetz, P. Nurmi, A. J. Oliner, S. Tarkoma et al., The company you keep, Proceedings of the 23rd international conference on World wide web, WWW '14, 2014.
DOI : 10.1145/2566486.2568046

H. Zang and J. Bolot, Anonymization of location data does not work, Proceedings of the 17th annual international conference on Mobile computing and networking, MobiCom '11, 2011.
DOI : 10.1145/2030613.2030630