K. Zickuhr, Location-based services, Pew Internet and American Life Project, 2013.

M. Madden, A. Lenhart, S. Cortesi, and U. Gasser, Teens and mobile apps privacy, Pew Internet and American Life Project, 2013.

B. Gedik and L. Liu, Protecting location privacy with personalized k-anonymity: Architecture and algorithms. Mobile Computing, IEEE Transactions on, vol.7, issue.1, pp.1-18, 2008.

A. R. Beresford and F. Stajano, Location privacy in pervasive computing. Pervasive Computing, IEEE, vol.2, issue.1, pp.46-55, 2003.

R. Cheng, Y. Zhang, E. Bertino, and S. Prabhakar, Preserving User Location Privacy in Mobile Data Management Infrastructures, In: Privacy Enhancing Technologies, pp.393-412, 2006.
DOI : 10.1007/11957454_23

M. L. Damiani, C. Silvestri, and E. Bertino, Fine-Grained Cloaking of Sensitive Positions in Location-Sharing Applications, IEEE Pervasive Computing, vol.10, issue.4, pp.64-72, 2011.
DOI : 10.1109/MPRV.2011.18

A. Smith and M. Duggan, Online dating and relationships. Pew Internet and American Life Project, 2013.

C. Patsakis, A. Asthenidis, and A. Chatzidimitriou, Social Networks as an Attack Platform: Facebook Case Study, 2009 Eighth International Conference on Networks, pp.245-247, 2009.
DOI : 10.1109/ICN.2009.77

G. Brown, T. Howe, M. Ihbe, A. Prakash, and K. Borders, Social networks and context-aware spam, Proceedings of the ACM 2008 conference on Computer supported cooperative work, CSCW '08, pp.8-403, 2008.
DOI : 10.1145/1460563.1460628

M. Huber, M. Mulazzani, E. Weippl, G. Kitzler, and S. Goluch, Friend-in-the-Middle Attacks: Exploiting Social Networking Sites for Spam, IEEE Internet Computing, vol.15, issue.3, pp.28-34, 2011.
DOI : 10.1109/MIC.2011.24

S. Abu-nimeh, T. Chen, and O. Alzubi, Malicious and Spam Posts in Online Social Networks, Computer, vol.44, issue.9, pp.23-28, 2011.
DOI : 10.1109/MC.2011.222

M. Huber, M. Mulazzani, E. Weippl, G. Kitzler, and S. Goluch, Exploiting social networking sites for spam, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pp.10-693, 2010.
DOI : 10.1145/1866307.1866400

T. N. Jagatic, N. A. Johnson, M. Jakobsson, and F. Menczer, Social phishing, Communications of the ACM, vol.50, issue.10, pp.94-100, 2007.
DOI : 10.1145/1290958.1290968

J. R. Douceur, The Sybil Attack, pp.251-260, 2002.
DOI : 10.1007/3-540-45748-8_24

L. Backstrom, C. Dwork, and J. Kleinberg, Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography, Proceedings of the 16th international conference on World Wide Web, pp.181-190, 2007.

K. Hoffman, D. Zage, and C. Nita-rotaru, A survey of attack and defense techniques for reputation systems, ACM Computing Surveys, vol.42, issue.1, 2009.
DOI : 10.1145/1592451.1592452

J. Krumm, Inference Attacks on Location Tracks, pp.127-143, 2007.
DOI : 10.1007/978-3-540-72037-9_8

S. Gambs, M. O. Killijian, and M. N. Del-prado-cortez, Show me how you move and I will tell you who you are, Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, SPRINGL '10, pp.103-126, 2011.
DOI : 10.1145/1868470.1868479

URL : https://hal.archives-ouvertes.fr/inria-00556833

S. Gambs, M. O. Killijian, and M. N. Del-prado-cortez, De-anonymization attack on geolocated data, In: TrustCom/ISPA/IUCC, pp.789-797, 2013.
URL : https://hal.archives-ouvertes.fr/hal-01242268

P. Golle and K. Partridge, On the Anonymity of Home/Work Location Pairs, pp.390-397, 2009.
DOI : 10.1007/978-3-642-01516-8_26

T. Pontes, M. A. Vasconcelos, J. M. Almeida, P. Kumaraguru, and V. Almeida, We know where you live, Proceedings of the 2012 ACM Conference on Ubiquitous Computing, UbiComp '12, pp.898-905, 2012.
DOI : 10.1145/2370216.2370419

V. Kostakos, J. Venkatanathan, B. Reynolds, N. Sadeh, E. Toch et al., Who's your best friend?, Proceedings of the 13th international conference on Ubiquitous computing, UbiComp '11, pp.11-177, 2011.
DOI : 10.1145/2030112.2030138

W. He, X. Liu, and M. Ren, Location Cheating: A Security Challenge to Location-Based Social Network Services, 2011 31st International Conference on Distributed Computing Systems, pp.740-749, 2011.
DOI : 10.1109/ICDCS.2011.42

S. Mascetti, D. Freni, C. Bettini, X. S. Wang, and S. Jajodia, Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies, The VLDB Journal, vol.29, issue.2, pp.541-566, 2011.
DOI : 10.1007/s00778-010-0213-7

E. Zheleva and L. Getoor, To join or not to join, Proceedings of the 18th international conference on World wide web, WWW '09, pp.531-540, 2009.
DOI : 10.1145/1526709.1526781

B. Carbunar, M. Rahman, N. Pissinou, and A. Vasilakos, A survey of privacy vulnerabilities and defenses in geosocial networks, IEEE Communications Magazine, vol.51, issue.11, pp.114-119, 2013.
DOI : 10.1109/MCOM.2013.6658662

R. Vicente, C. Freni, D. Bettini, C. Jensen, and C. S. , Location-Related Privacy in Geo-Social Networks, IEEE Internet Computing, vol.15, issue.3, pp.20-27, 2011.
DOI : 10.1109/MIC.2011.29

A. Narayanan, N. Thiagarajan, M. Lakhani, M. Hamburg, and D. Boneh, Location privacy via private proximity testing, Network & Distributed System Security Symposium, 2011.