A face is exposed for aol searcher no. 4417749, New York Times, vol.9, p.8, 2006. ,
Termite: Emulation Testbed for Encounter Networks, Proceedings of the 12th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services ,
DOI : 10.4108/eai.22-7-2015.2260069
Geo-indistinguishability: A Principled Approach to Location Privacy, Distributed Computing and Internet Technology, pp.49-72, 2015. ,
DOI : 10.1007/978-3-319-14977-6_4
URL : https://hal.archives-ouvertes.fr/hal-01114241
A survey on privacy in mobile participatory sensing applications, Journal of Systems and Software, vol.84, issue.11, pp.1928-1946, 2011. ,
DOI : 10.1016/j.jss.2011.06.073
Experimenting opportunistic networks with WiFi Direct, 2013 IFIP Wireless Days (WD), pp.1-6, 2013. ,
DOI : 10.1109/WD.2013.6686501
Anonysense, Proceeding of the 6th international conference on Mobile systems, applications, and services, MobiSys '08, pp.211-224, 2008. ,
DOI : 10.1145/1378600.1378624
Unique in the Crowd: The privacy bounds of human mobility, Scientific Reports, vol.23, 2013. ,
DOI : 10.1038/srep01376
Show me how you move and I will tell you who you are, Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, SPRINGL '10, pp.34-41, 2010. ,
DOI : 10.1145/1868470.1868479
URL : https://hal.archives-ouvertes.fr/inria-00556833
APISENSE R : une plate-forme répartie pour la conception, le déploiement et l'exécution de campagnes de collecte de données sur des terminaux intelligents, 2014. ,
Towards a mobile security & privacy simulator, 2011 IEEE Conference on Open Systems, pp.95-100, 2011. ,
DOI : 10.1109/ICOS.2011.6079294
Similitude: Interfacing a Traffic Simulator and Network Simulator with Emulated Android Clients, 2014 IEEE 80th Vehicular Technology Conference (VTC2014-Fall), pp.2014-80, 2014. ,
DOI : 10.1109/VTCFall.2014.6966178
Preserving privacy in participatory sensing systems, Computer Communications, vol.33, issue.11, pp.1266-1280, 2010. ,
DOI : 10.1016/j.comcom.2009.08.012
The Peer Sampling Service: Experimental Evaluation of Unstructured Gossip-Based Implementations, Proceedings of the 5th ACM/IFIP/USENIX international conference on Middleware, pp.79-98, 2004. ,
DOI : 10.1038/30918
How to predict congruential generators, Journal of Algorithms, vol.13, issue.4, pp.527-545, 1992. ,
DOI : 10.1016/0196-6774(92)90054-G
A survey of computational location privacy. Personal and Ubiquitous Computing, pp.391-399, 2009. ,
Privacy by Design ??? Principles of Privacy-Aware Ubiquitous Systems, Ubicomp 2001: Ubiquitous Computing, pp.273-291, 2001. ,
DOI : 10.1007/3-540-45427-6_23
t-Closeness: Privacy Beyond k-Anonymity and l-Diversity, 2007 IEEE 23rd International Conference on Data Engineering, pp.106-115, 2007. ,
DOI : 10.1109/ICDE.2007.367856
-diversity, ACM Transactions on Knowledge Discovery from Data, vol.1, issue.1, p.3, 2007. ,
DOI : 10.1145/1217299.1217302
A generic large scale simulator for ubiquitous computing, Mobile and Ubiquitous Systems: Networking & Services, 2006. ,
Adaptive blurring of sensor data to balance privacy and utility for ubiquitous services, Proceedings of the 30th Annual ACM Symposium on Applied Computing, SAC '15, pp.2271-2278, 2015. ,
DOI : 10.1145/2695664.2695855
A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management, 2010. ,
Privacy-Preserving Publication of Mobility Data with High Utility, 2015 IEEE 35th International Conference on Distributed Computing Systems, pp.802-803, 2015. ,
DOI : 10.1109/ICDCS.2015.117
URL : https://hal.archives-ouvertes.fr/hal-01159291
Can pseudonymity really guarantee privacy, USENIX Security Symposium, 2000. ,
Simonstrator: Simulation and Prototyping Platform for Distributed Mobile Applications, Proceedings of the Eighth EAI International Conference on Simulation Tools and Techniques, pp.99-108 ,
DOI : 10.4108/eai.24-8-2015.2261064
k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.10, issue.05, pp.557-570, 2002. ,
DOI : 10.1142/S0218488502001648
WiFi-Opp, Proceedings of the 6th ACM workshop on Challenged networks, CHANTS '11, pp.37-42, 2011. ,
DOI : 10.1145/2030652.2030664
Device driver-enabled wireless network emulation, Proceedings of the 4th International ICST Conference on Simulation Tools and Techniques, pp.188-197, 2011. ,