Location-based services, Pew Internet and American Life Project, 2013. ,
Teens and mobile apps privacy, Pew Internet and American Life Project, 2013. ,
Protecting location privacy with personalized k-anonymity: Architecture and algorithms. Mobile Computing, IEEE Transactions on, vol.7, issue.1, pp.1-18, 2008. ,
Location privacy in pervasive computing. Pervasive Computing, IEEE, vol.2, issue.1, pp.46-55, 2003. ,
Preserving User Location Privacy in Mobile Data Management Infrastructures, In: Privacy Enhancing Technologies, pp.393-412, 2006. ,
DOI : 10.1007/11957454_23
Fine-Grained Cloaking of Sensitive Positions in Location-Sharing Applications, IEEE Pervasive Computing, vol.10, issue.4, pp.64-72, 2011. ,
DOI : 10.1109/MPRV.2011.18
Online dating and relationships. Pew Internet and American Life Project, 2013. ,
Social Networks as an Attack Platform: Facebook Case Study, 2009 Eighth International Conference on Networks, pp.245-247, 2009. ,
DOI : 10.1109/ICN.2009.77
Social networks and context-aware spam, Proceedings of the ACM 2008 conference on Computer supported cooperative work, CSCW '08, pp.8-403, 2008. ,
DOI : 10.1145/1460563.1460628
Friend-in-the-Middle Attacks: Exploiting Social Networking Sites for Spam, IEEE Internet Computing, vol.15, issue.3, pp.28-34, 2011. ,
DOI : 10.1109/MIC.2011.24
Malicious and Spam Posts in Online Social Networks, Computer, vol.44, issue.9, pp.23-28, 2011. ,
DOI : 10.1109/MC.2011.222
Exploiting social networking sites for spam, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pp.10-693, 2010. ,
DOI : 10.1145/1866307.1866400
Social phishing, Communications of the ACM, vol.50, issue.10, pp.94-100, 2007. ,
DOI : 10.1145/1290958.1290968
The Sybil Attack, pp.251-260, 2002. ,
DOI : 10.1007/3-540-45748-8_24
Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography, Proceedings of the 16th international conference on World Wide Web, pp.181-190, 2007. ,
A survey of attack and defense techniques for reputation systems, ACM Computing Surveys, vol.42, issue.1, 2009. ,
DOI : 10.1145/1592451.1592452
Inference Attacks on Location Tracks, pp.127-143, 2007. ,
DOI : 10.1007/978-3-540-72037-9_8
Show me how you move and I will tell you who you are, Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, SPRINGL '10, pp.103-126, 2011. ,
DOI : 10.1145/1868470.1868479
URL : https://hal.archives-ouvertes.fr/inria-00556833
De-anonymization attack on geolocated data, In: TrustCom/ISPA/IUCC, pp.789-797, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-01242268
On the Anonymity of Home/Work Location Pairs, pp.390-397, 2009. ,
DOI : 10.1007/978-3-642-01516-8_26
We know where you live, Proceedings of the 2012 ACM Conference on Ubiquitous Computing, UbiComp '12, pp.898-905, 2012. ,
DOI : 10.1145/2370216.2370419
Who's your best friend?, Proceedings of the 13th international conference on Ubiquitous computing, UbiComp '11, pp.11-177, 2011. ,
DOI : 10.1145/2030112.2030138
Location Cheating: A Security Challenge to Location-Based Social Network Services, 2011 31st International Conference on Distributed Computing Systems, pp.740-749, 2011. ,
DOI : 10.1109/ICDCS.2011.42
Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies, The VLDB Journal, vol.29, issue.2, pp.541-566, 2011. ,
DOI : 10.1007/s00778-010-0213-7
To join or not to join, Proceedings of the 18th international conference on World wide web, WWW '09, pp.531-540, 2009. ,
DOI : 10.1145/1526709.1526781
A survey of privacy vulnerabilities and defenses in geosocial networks, IEEE Communications Magazine, vol.51, issue.11, pp.114-119, 2013. ,
DOI : 10.1109/MCOM.2013.6658662
Location-Related Privacy in Geo-Social Networks, IEEE Internet Computing, vol.15, issue.3, pp.20-27, 2011. ,
DOI : 10.1109/MIC.2011.29
Location privacy via private proximity testing, Network & Distributed System Security Symposium, 2011. ,