M. Alaggan, M. Cunche, and M. Minier, Privacy- Preserving t-Incidence for WiFi-based Mobility Analytics, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01376798

I. Atec and . France, Evaluations simultanées de différentes technologies innovantes de recueil de données trafic pour le calcul de temps de parcours en temps réel, 2015.

B. Bonné, A. Barzan, P. Quax, and W. Lamotte, WiFiPi: Involuntary tracking of visitors at mass events, 2013 IEEE 14th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM), pp.1-6, 2013.
DOI : 10.1109/WoWMoM.2013.6583443

B. Bonné, W. Lamotte, P. Quax, and K. Luyten, Raising Awareness on Smartphone Privacy Issues with SASQUATCH, and solving them with PrivacyPolice, Proceedings of the 11th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, pp.379-381
DOI : 10.4108/icst.mobiquitous.2014.258025

B. Bonné, P. Quax, and W. Lamotte, Your Mobile Phone is a Traitor!?Raising Awareness on Ubiquitous Privacy Issues with SASQUATCH, 2014.

O. Brendan and . Connor, CreepyDOL: Cheap, Distributed Stalking, 2013.

B. Fung, How stores use your phone's WiFi to track your shopping habits, 2013.

C. Bouchenard and . Jc, Decaux's pedestrian tracking system blocked by French data regulator, 2015.

S. Clifford and Q. Hardy, Attention, Shoppers: Store Is Tracking Your Cell. The New York Times, 2013.

L. Demir, M. Cunche, and C. Lauradoux, Analysing the privacy policies of Wi-Fi trackers, Proceedings of the 2014 workshop on physical analytics, WPA '14, pp.39-44, 2014.
DOI : 10.1145/2611264.2611266

URL : https://hal.archives-ouvertes.fr/hal-00983363

J. Freudiger, How talkative is your mobile device?, Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, WiSec '15, p.8, 2015.
DOI : 10.1109/SP.2011.18

X. Fu, N. Zhang, A. Pingley, W. Yu, J. Wang et al., The Digital Marauder's Map: A New Threat to Location Privacy, 2009 29th IEEE International Conference on Distributed Computing Systems, pp.589-596, 2009.
DOI : 10.1109/ICDCS.2009.57

M. Geuss, Creepy but legal phone-tracking company gets wrist slap for empty privacy promise, 2015.

E. Grumbach, iwlwifi: mvm: support random MAC address for scanning, Linux commit effd05ac479b

J. Martin, T. Mayberry, C. Donahue, L. Foppe, L. Brown et al., Abstract, Proceedings on Privacy Enhancing Technologies, vol.20, issue.4, 2017.
DOI : 20130910

URL : https://hal.archives-ouvertes.fr/hal-00648106

J. Martinez, Franken still unsatisfied with Euclid's privacy practices, TheHill, 2013.

C. Matte and M. Cunche, DEMO, Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, WiSec '16, pp.209-211, 2016.
DOI : 10.1145/2426656.2426685

URL : https://hal.archives-ouvertes.fr/hal-01330479

J. Mayer, A. Narayanan, and S. Stamm, Do Not Track: A Universal Third-Party Web Tracking Opt Out. Internet-Draft draft-mayer- do-not-track-00, 2011.

A. B. Musa and J. Eriksson, Tracking unmodified smartphones using wi-fi monitors, Proceedings of the 10th ACM Conference on Embedded Network Sensor Systems, SenSys '12, pp.281-294
DOI : 10.1145/2426656.2426685

URL : http://www.cs.uic.edu/~jakob/papers/musa-sensys12.pdf

L. T. Nguyen, Y. S. Kim, P. Tague, and J. Zhang, IdentityLink, Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp '14 Adjunct, pp.529-539, 2014.
DOI : 10.1145/2632048.2636072

P. Higgins and L. Tien, Mobile Tracking Code of Conduct Falls Short of Protecting Consumers, 2013.

P. Robyns, B. Bonné, P. Quax, and W. Lamotte, Noncooperative 802.11 MAC Layer Fingerprinting and Tracking of Mobile Devices, Security and Communication Networks, vol.6, issue.3, 2017.
DOI : 10.1109/mwc.2013.6549288

J. Scheuner, G. Mazlami, D. Schöni, S. Stephan, A. De-carli et al., Probr - A Generic and Passive WiFi Tracking System, 2016 IEEE 41st Conference on Local Computer Networks (LCN), pp.495-502, 2016.
DOI : 10.1109/LCN.2016.30

A. Sen, . Franken, and . Sen, Franken Presses Tech Firm to Stop Tracking Consumers without Their Permission | Al Franken | Senator for Minnesota

K. Skinner and J. Novak, Privacy and your app, Apple Worldwide Dev. Conf. (WWDC), 2015.

M. Vanhoef, C. Matte, M. Cunche, L. S. Cardoso, and F. Piessens, Why MAC Address Randomization is not Enough, Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, ASIA CCS '16, pp.413-424, 2016.
DOI : 10.1109/ISSPIT.2006.270915

URL : https://hal.archives-ouvertes.fr/hal-01282900

W. Wang, Wireless networking in Windows 10, Windows Hardware Engineering Community conference (WinHEC), 2015.

G. Wilkinson, Digital terrestrial tracking: The future of surveillance