M. Alaggan, M. Cunche, and M. Minier, Frequency of Elements in Sanitized Streams and t-Incidence Estimation from Differentially Pan-Private Bloom Filters. Under submission, 2016.

M. Alaggan, S. Gambs, and A. Kermarrec, BLIP: Non-interactive Differentially-Private Similarity Computation on Bloom filters, Proceedings of the 14th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS12), 2012.
DOI : 10.1007/978-3-642-33536-5_20

URL : https://hal.archives-ouvertes.fr/hal-00724829

M. Alaggan, S. Gambs, S. Matwin, and M. Tuhin, Sanitization of Call Detail Records via Differentially-Private Bloom Filters, Data and Applications Security and Privacy XXIX -29th Annual IFIP WG 11.3 Working Conference Proceedings, volume 9149 of Lecture Notes in Computer Science, pp.223-230, 2015.
DOI : 10.1007/978-3-319-20810-7_15

URL : https://hal.archives-ouvertes.fr/hal-01244580

V. Marco, A. Barbera, A. Epasto, S. Mei, . Kosta et al., CRAWDAD dataset sapienza/probe-requests (v. 2013-09-10) Downloaded from http, 2013.

H. Burton and . Bloom, Space/Time Trade-offs in Hash Coding with Allowable Errors, Commun. ACM, vol.13, issue.7, pp.422-426, 1970.

Z. Andrei, A. R. Broder, and . Karlin, Multilevel adaptive hashing, Proceedings of the First Annual ACM-SIAM Symposium on Discrete Algorithms, pp.22-24, 1990.

S. Datoo, How tracking customers in-store will soon be the norm, 2014.

L. Demir, M. Cunche, and C. Lauradoux, Analysing the privacy policies of Wi-Fi trackers, Proceedings of the 2014 workshop on physical analytics, WPA '14, 2014.
DOI : 10.1145/2611264.2611266

URL : https://hal.archives-ouvertes.fr/hal-00983363

C. Dwork and . Privacy, Differential Privacy, Proceedings of the 33rd International Colloquium on Automata, Languages and Programming (ICALP'06), Part II, pp.1-12, 2006.
DOI : 10.1007/11787006_1

C. Dwork and M. Naor, On the Difficulties of Disclosure Prevention in Statistical Databases or the Case for Differential Privacy, Journal of Privacy and Confidentiality, vol.2, issue.1, p.8, 2008.

C. Dwork, M. Naor, T. Pitassi, G. N. Rothblum, and S. Yekhanin, Pan- Private Streaming Algorithms, Proceedings of the 1st Symposium on Innovations in Computer Science (ICS'10), pp.66-80, 2010.

D. Goodin, No, this isn't a scene from minority report. This trash can is stalking you. Ars Technica, 2013.

B. Greenstein, R. Gummadi, J. Pang, M. Y. Chen, T. Kohno et al., Can Ferris Bueller still have his day off? protecting privacy in the wireless era, Proceedings of the 11th USENIX workshop on Hot topics in operating systems, pp.1-10, 2007.

M. Kamp, C. Kopp, M. Mock, M. Boley, and M. , Privacy-Preserving Mobility Monitoring Using Sketches of Stationary Sensor Readings, Machine Learning and Knowledge Discovery in Databases -European Conference, ECML PKDD 2013 Proceedings, Part III, pp.370-386, 2013.
DOI : 10.1007/978-3-642-40994-3_24

A. Musa and J. Eriksson, Tracking unmodified smartphones using wi-fi monitors, Proceedings of the 10th ACM Conference on Embedded Network Sensor Systems, SenSys '12, pp.281-294, 2012.
DOI : 10.1145/2426656.2426685

P. Future and . Forum, Mobile Location Analytics Code of Conduct, 2013.

L. Sweeney, My phone at your service. Federal Trade Commission, 2014.