, Standard for Information technology-Telecommunications and information exchange between systems Local and metropolitan area networks-Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 5: Preassociation Discovery, IEEE
Bluetooth and Wi-Fi MAC address based crowd data collection and monitoring: benefits, challenges and enhancement, 2013. ,
About the security content of iOS 8, pp.2020-2023, 2020. ,
New privacy issues in mobile telephony: fix and verification, Proceedings of the 2012 ACM conference on Computer and communications security, pp.205-216, 2012. ,
Wireless sensor network protocol property validation through the system's simulation in a dedicated framework, 10th International Conference on Signal Processing and Communication Systems (ICSPCS). IEEE, pp.1-9, 2016. ,
A passive testing approach based on invariants: application to the WAP, Computer networks, vol.48, pp.247-266, 2005. ,
, Tracking Anonymized Bluetooth Devices. Proceedings on Privacy Enhancing Technologies, vol.1, p.17, 2019.
Towards the testing of composed web services in 3 rd generation networks, IFIP International Conference on Testing of Communicating Systems, pp.118-133, 2006. ,
WiFiPi: Involuntary tracking of visitors at mass events, 2013 IEEE 14th International Symposium on" A World of Wireless, Mobile and Multimedia Networks, 2013. ,
, IEEE, pp.1-6
Saving Private Addresses: An Analysis of Privacy Issues in the Bluetooth-Low-Energy Advertising Mechanism, MobiQuitous 2019 -16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, pp.1-10, 2019. ,
URL : https://hal.archives-ouvertes.fr/hal-02394629
Discontinued Privacy: Personal Data Leaks in Apple Bluetooth-Low-Energy Continuity Protocols, Proceedings on Privacy Enhancing Technologies, vol.2020, pp.26-46, 2020. ,
URL : https://hal.archives-ouvertes.fr/hal-02394619
Wireshark -The world's foremost and widely-used network protocol analyzer, pp.2020-2023, 1998. ,
Analysing the privacy policies of Wi-Fi trackers, Proceedings of the 2014 workshop on physical analytics, pp.39-44, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-00968585
Protecting Privacy of BLE Device Users, USENIX Security Symposium, pp.1205-1221, 2016. ,
How talkative is your mobile device?: an experimental study of Wi-Fi probe requests, Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, vol.8, 2015. ,
Enhancing location privacy in wireless LAN through disposable interface identifiers: a quantitative analysis, Mobile Networks and Applications, vol.10, pp.315-325, 2005. ,
BlueTrack -Imperceptible tracking of bluetooth devices, Ubicomp Poster Proceedings, 2004. ,
An automata-based approach to property testing in event traces, IFIP International Conference on Testing of Software and Communicating Systems, pp.180-196, 2003. ,
Slede: a domainspecific verification framework for sensor network security protocol implementations, Proceedings of the first ACM conference on Wireless network security, pp.109-118, 2008. ,
Changes to Device Identifiers in Android O, 2017. ,
, The Store Of The Future: 150+ Startups Transforming Brick-And-Mortar Retail In One Infographic, pp.2020-2023, 2017.
Supervision patterns in discrete event systems diagnosis, 8th International Workshop on Discrete Event Systems, pp.262-268, 2006. ,
URL : https://hal.archives-ouvertes.fr/inria-00001113
PyShark -Python packet parser using wireshark's tshark, pp.2020-2023, 2020. ,
Urban phenology: Toward a real-time census of the city using Wi-Fi data, Computers, Environment and Urban Systems, vol.64, pp.144-153, 2017. ,
Modelling Microscopic Pedestrian Mobility using Bluetooth, ICAART, pp.270-275, 2012. ,
Handoff All Your Privacy: A Review of Apple's Bluetooth Low Energy Implementation, 2019. ,
A study of MAC address randomization in mobile devices and when it fails, Proceedings on Privacy Enhancing Technologies, vol.4, pp.365-383, 2017. ,
Defeating MAC address randomization through timing attacks, Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, pp.15-20, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01330476
Tracking unmodified smartphones using wi-fi monitors, Proceedings of the 10th ACM conference on embedded network sensor systems, pp.281-294, 2012. ,
Privacy of London Tube Wifi Tracking, pp.2020-2023, 2017. ,
Anonymity, unlinkability, unobservability, pseudonymity, and identity management-a consolidated proposal for terminology, 2005. ,
, Android Open Source Project, pp.2020-2023, 2020.
Devices That Tell on You: Privacy Trends in Consumer Ubiquitous Computing, USENIX Security Symposium, pp.55-70, 2007. ,
Bluetooth Core Specification v4, pp.2020-2023, 2010. ,
Bluetooth Core Specification v5, vol.2, pp.2020-2023, 2019. ,
Why MAC address randomization is not enough: An analysis of Wi-Fi network discovery mechanisms, Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, pp.413-424, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01282900
The use of Bluetooth for analysing spatiotemporal dynamics of human movement at mass events: A case study of the Ghent Festivities, Applied Geography, vol.32, pp.208-220, 2012. ,
Fingerprinting Wi-Fi devices using software defined radios, Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, pp.3-14, 2016. ,