M. Barbaro, T. Zeller, and S. Hansell, A face is exposed for aol searcher no. 4417749, New York Times, vol.9, p.8, 2006.

R. Bruno, N. Santos, and P. Ferreira, Termite: Emulation Testbed for Encounter Networks, Proceedings of the 12th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services
DOI : 10.4108/eai.22-7-2015.2260069

K. Chatzikokolakis, C. Palamidessi, and M. Stronati, Geo-indistinguishability: A Principled Approach to Location Privacy, Distributed Computing and Internet Technology, pp.49-72, 2015.
DOI : 10.1007/978-3-319-14977-6_4

URL : https://hal.archives-ouvertes.fr/hal-01114241

D. Christin, A. Reinhardt, S. S. Kanhere, and M. Hollick, A survey on privacy in mobile participatory sensing applications, Journal of Systems and Software, vol.84, issue.11, pp.1928-1946, 2011.
DOI : 10.1016/j.jss.2011.06.073

M. Conti, F. Delmastro, G. Minutiello, and R. Paris, Experimenting opportunistic networks with WiFi Direct, 2013 IFIP Wireless Days (WD), pp.1-6, 2013.
DOI : 10.1109/WD.2013.6686501

C. Cornelius, A. Kapadia, D. Kotz, D. Peebles, M. Shin et al., Anonysense, Proceeding of the 6th international conference on Mobile systems, applications, and services, MobiSys '08, pp.211-224, 2008.
DOI : 10.1145/1378600.1378624

Y. De-montjoye, C. A. Hidalgo, M. Verleysen, and V. D. Blondel, Unique in the Crowd: The privacy bounds of human mobility, Scientific Reports, vol.23, 2013.
DOI : 10.1038/srep01376

S. Gambs, M. Killijian, M. N. Del-prado, and C. , Show me how you move and I will tell you who you are, Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, SPRINGL '10, pp.34-41, 2010.
DOI : 10.1145/1868470.1868479

URL : https://hal.archives-ouvertes.fr/inria-00556833

N. Haderer, APISENSE R : une plate-forme répartie pour la conception, le déploiement et l'exécution de campagnes de collecte de données sur des terminaux intelligents, 2014.

B. Henne, C. Szongott, and M. Smith, Towards a mobile security & privacy simulator, 2011 IEEE Conference on Open Systems, pp.95-100, 2011.
DOI : 10.1109/ICOS.2011.6079294

S. N. Hetu, V. S. Hamishagi, and L. Peh, Similitude: Interfacing a Traffic Simulator and Network Simulator with Emulated Android Clients, 2014 IEEE 80th Vehicular Technology Conference (VTC2014-Fall), pp.2014-80, 2014.
DOI : 10.1109/VTCFall.2014.6966178

K. L. Huang, S. S. Kanhere, and W. Hu, Preserving privacy in participatory sensing systems, Computer Communications, vol.33, issue.11, pp.1266-1280, 2010.
DOI : 10.1016/j.comcom.2009.08.012

M. Jelasity, R. Guerraoui, A. Kermarrec, and M. Van-steen, The Peer Sampling Service: Experimental Evaluation of Unstructured Gossip-Based Implementations, Proceedings of the 5th ACM/IFIP/USENIX international conference on Middleware, pp.79-98, 2004.
DOI : 10.1038/30918

H. Krawczyk, How to predict congruential generators, Journal of Algorithms, vol.13, issue.4, pp.527-545, 1992.
DOI : 10.1016/0196-6774(92)90054-G

J. Krumm, A survey of computational location privacy. Personal and Ubiquitous Computing, pp.391-399, 2009.

M. Langheinrich, Privacy by Design ??? Principles of Privacy-Aware Ubiquitous Systems, Ubicomp 2001: Ubiquitous Computing, pp.273-291, 2001.
DOI : 10.1007/3-540-45427-6_23

N. Li, T. Li, and S. Venkatasubramanian, t-Closeness: Privacy Beyond k-Anonymity and l-Diversity, 2007 IEEE 23rd International Conference on Data Engineering, pp.106-115, 2007.
DOI : 10.1109/ICDE.2007.367856

A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubramaniam, -diversity, ACM Transactions on Knowledge Discovery from Data, vol.1, issue.1, p.3, 2007.
DOI : 10.1145/1217299.1217302

M. Martin and P. Nurmi, A generic large scale simulator for ubiquitous computing, Mobile and Ubiquitous Systems: Networking & Services, 2006.

A. Moawad, T. Hartmann, F. Fouquet, J. Klein, and Y. Le-traon, Adaptive blurring of sensor data to balance privacy and utility for ubiquitous services, Proceedings of the 30th Annual ACM Symposium on Applied Computing, SAC '15, pp.2271-2278, 2015.
DOI : 10.1145/2695664.2695855

A. Pfitzmann and M. Hansen, A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management, 2010.

V. Primault, S. B. Mokhtar, and L. Brunie, Privacy-Preserving Publication of Mobility Data with High Utility, 2015 IEEE 35th International Conference on Distributed Computing Systems, pp.802-803, 2015.
DOI : 10.1109/ICDCS.2015.117

URL : https://hal.archives-ouvertes.fr/hal-01159291

J. R. Rao and P. Rohatgi, Can pseudonymity really guarantee privacy, USENIX Security Symposium, 2000.

B. Richerzhagen, D. Stingl, J. Rückert, and R. Steinmetz, Simonstrator: Simulation and Prototyping Platform for Distributed Mobile Applications, Proceedings of the Eighth EAI International Conference on Simulation Tools and Techniques, pp.99-108
DOI : 10.4108/eai.24-8-2015.2261064

L. Sweeney, k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.10, issue.05, pp.557-570, 2002.
DOI : 10.1142/S0218488502001648

S. Trifunovic, B. Distl, D. Schatzmann, and F. Legendre, WiFi-Opp, Proceedings of the 6th ACM workshop on Challenged networks, CHANTS '11, pp.37-42, 2011.
DOI : 10.1145/2030652.2030664

E. Weingärtner, H. V. Lehn, and K. Wehrle, Device driver-enabled wireless network emulation, Proceedings of the 4th International ICST Conference on Simulation Tools and Techniques, pp.188-197, 2011.