J. Al-muhtadi, R. Campbell, A. Kapadia, M. D. Mickunas, and S. Yi, Routing through the mist: privacy preserving communication in ubiquitous computing environments, Proceedings 22nd International Conference on Distributed Computing Systems, pp.74-83, 2002.
DOI : 10.1109/ICDCS.2002.1022244

A. R. Beresford and F. Stajano, Location privacy in pervasive computing, IEEE Pervasive Computing, vol.2, issue.1, pp.46-55, 2003.
DOI : 10.1109/MPRV.2003.1186725

M. Boyle, C. Edwards, and S. Greenberg, The effects of filtered video on awareness and privacy, Proceedings of the 2000 ACM conference on Computer supported cooperative work , CSCW '00, pp.1-10, 2000.
DOI : 10.1145/358916.358935

S. A. Brands, Rethinking Public Key Infrastructures and Digital Certificates: building in privacy, 2000.

J. Camenisch, D. Shelat, S. Sommer, M. Fischer-hübner, H. Hansen et al., Privacy and identity management for everyone, Proceedings of the 2005 workshop on Digital identity management , DIM '05, pp.20-27, 2005.
DOI : 10.1145/1102486.1102491

D. Chaum and E. Van-heyst, Group Signatures, Eurocrypt '91, pp.257-265, 1991.
DOI : 10.1007/3-540-46416-6_22

D. L. Chaum, Untraceable electronic mail, return addresses, and digital pseudonyms, Communications of the ACM, vol.24, issue.2, pp.84-90, 1981.
DOI : 10.1145/358549.358563

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.128.8210

E. S. Chung, J. I. Hong, J. Lin, M. K. Prabaker, J. A. Landay et al., Development and evaluation of emerging design patterns for ubiquitous computing, Proceedings of the 2004 conference on Designing interactive systems processes, practices, methods, and techniques, DIS '04, pp.233-242, 2004.
DOI : 10.1145/1013115.1013148

J. L. Crowley, J. Coutaz, and F. Bérard, Perceptual user interfaces: things that see, Communications of the ACM, vol.43, issue.3, pp.54-64, 2000.
DOI : 10.1145/330534.330540

R. Dingledine, N. Mathewson, and P. Syverson, Tor: The second-generation onion router, Proceedings of the 13th USENIX, pp.303-320, 2004.

M. Duckham and L. Kulik, A Formal Model of Obfuscation and Negotiation for Location Privacy, Proceedings of PERVASIVE 2005, pp.152-170, 2005.
DOI : 10.1007/11428572_10

M. J. Freedman and R. Morris, Tarzan, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, pp.193-206, 2002.
DOI : 10.1145/586110.586137

M. Gruteser and D. Grunwald, Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking, Proceedings of the 1st international conference on Mobile systems, applications and services, MobiSys '03, pp.31-42, 2003.
DOI : 10.1145/1066116.1189037

J. I. Hong and J. A. Landay, An architecture for privacy-sensitive ubiquitous computing, Proceedings of the 2nd international conference on Mobile systems, applications, and services , MobiSYS '04, pp.177-189, 2004.
DOI : 10.1145/990064.990087

S. E. Hudson, I. Smith, H. Kido, Y. Yanagisawa, and T. Satoh, Techniques for addressing fundamental privacy and disruption tradeoffs in awareness support systems An anonymous communication technique using dummies for location-based services, Proceedings of ACM CSCW '96 Proceedings of the IEEE ICPS'05, pp.248-257, 1996.

L. Korba and S. Kenny, Towards Meeting the Privacy Challenge: Adapting DRM, ACM CCS-9 Workshop, pp.118-136, 2003.
DOI : 10.1007/978-3-540-44993-5_8

S. Lahlou and F. Jegou, European disappearing computer privacy design guidelines v1.1, 2004.

B. W. Lampson, A note on the confinement problem, Communications of the ACM, vol.16, issue.10, pp.613-615, 1973.
DOI : 10.1145/362375.362389

M. Langheinrich, Privacy by Design ??? Principles of Privacy-Aware Ubiquitous Systems, pp.273-291, 2001.
DOI : 10.1007/3-540-45427-6_23

M. Langheinrich, A Privacy Awareness System for Ubiquitous Computing Environments, pp.237-245, 2002.
DOI : 10.1007/3-540-45809-3_19

C. Neustaedter and S. Greenberg, The Design of a Context-Aware Home Media Space for Balancing Privacy and Awareness, pp.297-314, 2003.
DOI : 10.1007/978-3-540-39653-6_24

A. Pretschner, M. Hilty, and D. Basin, Distributed usage control, Communications of the ACM, vol.49, issue.9, pp.39-44, 2006.
DOI : 10.1145/1151030.1151053

P. Raverdy, O. Riva, A. De-la-chapelle, R. Chibout, and V. Issarny, Efficient Context-aware Service Discovery in Multi-Protocol Pervasive Environments, 7th International Conference on Mobile Data Management (MDM'06), p.3, 2006.
DOI : 10.1109/MDM.2006.78

URL : https://hal.archives-ouvertes.fr/inria-00415112

J. Reagle and L. F. Cranor, The platform for privacy preferences, Communications of the ACM, vol.42, issue.2, pp.48-55, 1999.
DOI : 10.1145/293411.293455

M. K. Reiter and A. D. Rubin, Crowds: anonymity for Web transactions, ACM Transactions on Information and System Security, vol.1, issue.1, pp.66-92, 1998.
DOI : 10.1145/290163.290168

R. L. Rivest, A. S. , and Y. Tauman, How to Leak a Secret, Proceedings of ASIACRYPT '01, pp.552-565, 2001.
DOI : 10.1007/3-540-45682-1_32

R. Sherwood, B. Bhattacharjee, and A. Srinivasan, P5: A protocol for scalable anonymous communication, Proceedings of IEEE SP '02, p.58, 2002.

Q. A. Zhao and J. T. Stasko, Evaluating image filtering based techniques in media space applications, Proceedings of the 1998 ACM conference on Computer supported cooperative work , CSCW '98, pp.11-18, 1998.
DOI : 10.1145/289444.289450