M. E. Andr´es, N. E. Bordenabe, K. Chatzikokolakis, and . Palamidessi, Geo-indistinguishability: Differential Privacy for Locationbased Systems, CCS, pp.901-914, 2013.

I. Bilogrevic, K. Huguenin, M. Jadliwala, F. Lopez, P. Jean-pierrehubaux et al., Academic Networks Using Short-Range Wireless Communications. Wpes, pp.179-188, 2013.

S. Cerf, V. Primault, A. Boutet, S. B. Mokhtar, R. Birke et al., PULP: Achieving Privacy and Utility Trade-Off in User Mobility Data, 2017 IEEE 36th Symposium on Reliable Distributed Systems (SRDS), pp.164-173, 2017.
DOI : 10.1109/SRDS.2017.25

URL : https://hal.archives-ouvertes.fr/hal-01578635

K. Dong, T. Gu, X. Tao, and J. Lu, Complete Bipartite Anonymity: Confusing Anonymous Mobility Traces for Location Privacy, 2012 IEEE 18th International Conference on Parallel and Distributed Systems, pp.205-212, 2012.
DOI : 10.1109/ICPADS.2012.37

C. Dwork, Differential Privacy, Automata, Languages and Programming, pp.1-12, 2006.
DOI : 10.1007/11787006_1

L. Franceschi-bicchierai, Redditor cracks anonymous data trove to pinpoint muslim cab drivers, 2015.

S. Gambs, M. Killijian, M. Nunez-del-prado, and C. , De-anonymization Attack on Geolocated Data, 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp.789-797, 2013.
DOI : 10.1109/trustcom.2013.96

URL : https://hal.archives-ouvertes.fr/hal-01242268

S. Gambs, M. Killijian, and M. Cortez, Show me how you move and I will tell you who you are, Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, SPRINGL '10, pp.103-126, 2011.
DOI : 10.1145/1868470.1868479

URL : https://hal.archives-ouvertes.fr/inria-00556833

S. Gambs, M. Killijian, and M. Cortez, Next place prediction using mobility Markov chains, Proceedings of the First Workshop on Measurement, Privacy, and Mobility, MPM '12, p.3, 2012.
DOI : 10.1145/2181196.2181199

URL : https://hal.archives-ouvertes.fr/hal-00736947

B. Gedik and L. Liu, A customizable k-anonymity model for protecting location privacy, 2004.

N. Li, T. Li, and S. Venkatasubramanian, t-Closeness: Privacy Beyond k-Anonymity and l-Diversity, 2007 IEEE 23rd International Conference on Data Engineering, pp.106-115, 2007.
DOI : 10.1109/ICDE.2007.367856

URL : http://www.cs.purdue.edu/homes/ninghui/papers/t_closeness_icde07.pdf

A. Machanavajjhala, J. Gehrke, D. Kifer, and M. , -diversity, Data Engineering, 2006. ICDE'06. Proceedings of the 22nd International Conference on, pp.24-24, 2006.
DOI : 10.1145/1217299.1217302

M. Maouche, S. B. Mokhtar, and S. Bouchenak, AP-Attack: A Novel User Re-identification Attack On Mobility Datasets, Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, 2017.
DOI : 10.4108/eai.7-11-2017.2273573

URL : https://hal.archives-ouvertes.fr/hal-01785155

K. Micinski, P. Phelps, S. Jeffrey, and . Foster, An empirical study oflocation truncation on android, 2013.

F. Mohamed, C. Mokbel, . Chow, G. Walid, and . Aref, The new casper: Queryprocessing for location services without compromising privacy, Proceedings of the 32nd international conference on Very large data bases, pp.763-774, 2006.

S. Pellegrini, A. Ess, K. Schindler, and L. Van-gool, You'll never walk alone: Modeling social behavior for multi-target tracking, 2009 IEEE 12th International Conference on Computer Vision, pp.261-268, 2009.
DOI : 10.1109/ICCV.2009.5459260

URL : http://vision.cse.psu.edu/courses/Tracking/vlpr12/PellegriniNeverWalkAlone.pdf

V. Primault, S. B. Mokhtar, C. Lauradoux, and L. Brunie, Differentially Private Location Privacy in Practice, MoST'14, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01148230

V. Primault, S. B. Mokhtar, C. Lauradoux, and L. Brunie, Timedistortion anonymization for the publication of mobility data with high utility, TrustCom, pp.539-546, 2015.

L. Sweeney, k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.2, issue.3, pp.557-570, 2002.
DOI : 10.1109/RISP.1993.287632

M. Wernke, P. Skvortsov, F. Du¨rr, and K. Rothermel, A classificationof location privacy attacks and approaches. Personal and ubiquitous computing, pp.163-175, 2014.
DOI : 10.1007/s00779-012-0633-z

Y. Wu, K. Abinav-sankararaman, and S. Lafortune, Ensuringprivacy in location-based services: An approach based on opacity enforcement, IFAC Proceedings Volumes, pp.33-38, 2014.
DOI : 10.3182/20140514-3-fr-4046.00008

G. Yava¸s and D. Katsaros, A data mining approach for location prediction in mobile environments, Data & Knowledge Engineering, vol.54, issue.2, pp.121-146, 2005.
DOI : 10.1016/j.datak.2004.09.004