L. Wireless and . Medium, Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE Std, vol.802, pp.1-2793, 2012.

M. V. Barbera, A. Epasto, A. Mei, V. C. Perta, and J. Stefa, Signals from the crowd: Uncovering social relationships through smartphone probes, Proceedings of the 2013 Conference on Internet Measurement Conference, pp.265-276, 2013.

J. Freudiger, How talkative is your mobile device?: An experimental study of wi-fi probe requests, Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks. pp. 8:1-8:6. WiSec '15, 2015.

B. Greenstein, D. Mccoy, J. Pang, T. Kohno, S. Seshan et al., Improving wireless privacy with an identifier-free link layer protocol, Proceedings of the 6th International Conference on Mobile Systems, Applications, and Services, pp.40-53, 2008.

M. Gruteser and D. Grunwald, Enhancing location privacy in wireless lan through disposable interface identifiers: A quantitative analysis, Proceedings of the 1st ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots, pp.46-55, 2003.

J. Lindqvist, T. Aura, G. Danezis, T. Koponen, A. Myllyniemi et al., Privacy-preserving 802.11 access-point discovery, Proceedings of the Second ACM Conference on Wireless Network Security, pp.123-130, 2009.

J. Martin, T. Mayberry, C. Donahue, L. Foppe, L. Brown et al., A study of mac address randomization in mobile devices and when it fails, 2017.

C. Matte, M. Cunche, F. Rousseau, and M. Vanhoef, Defeating mac address randomization through timing attacks, Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, pp.15-20, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01330476

J. Pang, B. Greenstein, R. Gummadi, S. Seshan, and D. Wetherall, 802.11 user fingerprinting, Proceedings of the 13th Annual ACM International Conference on Mobile Computing and Networking. pp. 99-110. MobiCom '07, 2007.

S. Riley, Myth vs. reality: Wireless ssids, 2007.

D. Singelée and B. Preneel, Location privacy in wireless personal area networks, Proceedings of the 5th ACM Workshop on Wireless Security, pp.11-18, 2006.

M. Vanhoef, C. Matte, M. Cunche, L. S. Cardoso, and F. Piessens, Why mac address randomization is not enough: An analysis of wi-fi network discovery mechanisms, Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, vol.16, pp.413-424, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01282900

O. Waltari and J. Kangasharju, The wireless shark: Identifying wifi devices based on probe fingerprints, Proceedings of the First Workshop on Mobile Data, pp.1-6, 2016.

,