O. Abul, F. Bonchi, and M. Nanni, Never Walk Alone: Uncertainty for Anonymity in Moving Objects Databases, 2008 IEEE 24th International Conference on Data Engineering, pp.376-385, 2008.
DOI : 10.1109/ICDE.2008.4497446

URL : http://www-kdd.isti.cnr.it/NWA/NWA_ICDE08.pdf

O. Abul, F. Bonchi, and M. Nanni, Anonymization of moving objects databases by clustering and perturbation, Information Systems, vol.35, issue.8, pp.884-910, 2010.
DOI : 10.1016/j.is.2010.05.003

. Osman, Wait 4 Me: Time-tolerant Anonymization of Moving Objects Databases ? Executable

J. Prasad-achara, F. Baudot, C. Castelluccia, G. Delcroix, and V. Roca, Mobilitics: Analyzing Privacy Leaks in Smartphones, ERCIM News, issue.93, pp.2013-2013

G. Acs and C. Castelluccia, A case study, Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '14, pp.1679-1688, 2014.
DOI : 10.1145/2623330.2623361

URL : https://hal.archives-ouvertes.fr/hal-01060070

. Berker-agir, . Thanasisg, R. Papaioannou, K. Narendula, J. Aberer et al., User-side adaptive protection of location privacy in participatory sensing, GeoInformatica, vol.13, issue.6, pp.165-191, 2014.
DOI : 10.1007/978-3-642-22263-4_4

N. Aharony, W. Pan, C. Ip, I. Khayal, and A. Pentland, Social fMRI: Investigating and shaping social mechanisms in the real world, Pervasive and Mobile Computing, vol.7, issue.6, pp.643-659, 2011.
DOI : 10.1016/j.pmcj.2011.09.004

I. Altintas, C. Berkley, E. Jaeger, M. Jones, B. Ludascher et al., Kepler: an extensible system for design and execution of scientific workflows, Proceedings. 16th International Conference on Scientific and Statistical Database Management, 2004., p.423, 2004.
DOI : 10.1109/SSDM.2004.1311241

URL : http://www.sdsc.edu/~ludaesch/Paper/ssdbm04-kepler.pdf

M. E. Andrès and N. E. Bordenabe, Konstantinos Chatzikokolakis, and Catuscia Palamidessi. Geo-indistinguishability: Differential Privacy for Locationbased Systems, CCS, pp.901-914, 2013.

M. Baker, 1,500 scientists lift the lid on reproducibility, Nature, vol.533, issue.7604, pp.452-454, 2016.
DOI : 10.1038/533452a

URL : http://www.nature.com:80/polopoly_fs/1.19970!/menu/main/topColumns/topLeftColumn/pdf/533452a.pdf

B. Bamba, L. Liu, P. Pesti, and T. Wang, Supporting anonymous location queries in mobile environments with privacygrid, WWW, pp.237-246, 2008.
DOI : 10.1145/1367497.1367531

URL : http://www-static.cc.gatech.edu/~lingliu/papers/2008/WWW08-PrivacyGrid.pdf

M. Barbaro and T. Zeller-jr, Available online at http://www.nytimes. com, 2006.

A. R. Beresford and F. Stajano, Mix zones: user privacy in location-aware services, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second, p.127, 2004.
DOI : 10.1109/PERCOMW.2004.1276918

URL : http://www-lce.eng.cam.ac.uk/~arb33/papers/BeresfordStajano-MixZones-PerSec2004.pdf

A. R. Beresford and F. Stajano, Location privacy in pervasive computing. Pervasive Computing, IEEE, vol.2, issue.1, pp.46-55, 2003.
DOI : 10.1109/mprv.2003.1186725

A. Bessani, J. Sousa, and E. E. Alchieri, State Machine Replication for the Masses with BFT-SMART, 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, pp.355-362, 2014.
DOI : 10.1109/DSN.2014.43

URL : http://www.di.fc.ul.pt/~bessani/publications/dsn14-bftsmart.pdf

I. Bilogrevic, K. Huguenin, M. Jadliwala, F. Lopez, J. Hubaux et al., Inferring social ties in academic networks using short-range wireless communications, Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society, WPES '13, pp.179-188, 2013.
DOI : 10.1145/2517840.2517842

URL : https://hal.archives-ouvertes.fr/hal-00853975

V. Bindschaedler and R. Shokri, Synthesizing Plausible Privacy-Preserving Location Traces, 2016 IEEE Symposium on Security and Privacy (SP), 2016.
DOI : 10.1109/SP.2016.39

A. Boutet, S. B. Mokhtar, and V. Primault, Uniqueness Assessment of Human Mobility on Multi-Sensor Datasets, LIRIS UMR CNRS 5205, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01381986

H. Carter, B. Mood, P. Traynor, and K. Butler, Secure outsourced garbled circuit evaluation for mobile devices, Proceedings of the 22nd USENIX Conference on Security, pp.289-304, 2013.
DOI : 10.1007/s00145-007-9015-5

URL : https://www.usenix.org/system/files/conference/usenixsecurity13/sec13-paper_carter.pdf

S. Chakraborty, C. Shen, Y. Kasturi-rangan-raghavan, M. Shoukry, M. Millar et al., ipshield: A framework for enforcing context-aware privacy, Proceedings of the 11th USENIX Conference on Networked Systems Design and Implementation, NSDI'14, pp.143-156, 2014.

K. Chatzikokolakis, C. Palamidessi, and M. Stronati, A Predictive Differentially-Private Mechanism for Mobility Traces, PETS, pp.21-41, 2014.
DOI : 10.1007/978-3-319-08506-7_2

URL : https://hal.archives-ouvertes.fr/hal-01011260

K. Chatzikokolakis, C. Palamidessi, and M. Stronati, Constructing elastic distinguishability metrics for location privacy, Proceedings on Privacy Enhancing Technologies, pp.156-170, 2015.
DOI : 10.1515/popets-2015-0023

URL : https://hal.archives-ouvertes.fr/hal-01270197

L. David and . Chaum, Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms, Communications of the ACM, vol.24, issue.2, pp.84-90, 1981.

R. Chen, C. M. Benjamin, . Fung, C. Bipin, N. M. Desai et al., Differentially private transit data publication, Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '12, pp.213-221, 2012.
DOI : 10.1145/2339530.2339564

E. Cho, S. A. Myers, and J. Leskovec, Friendship and mobility, Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '11, pp.1082-1090, 2011.
DOI : 10.1145/2020408.2020579

B. Chor, O. Goldreich, E. Kushilevitz, and M. Sudan, Private Information Retrieval, FOCS, p.41, 1995.

C. Chow, M. F. Mokbel, and X. Liu, A peer-to-peer spatial cloaking algorithm for anonymous location-based service, Proceedings of the 14th annual ACM international symposium on Advances in geographic information systems , GIS '06, pp.171-178, 2006.
DOI : 10.1145/1183471.1183500

&. City-domination-gmbh, . Co, and . Kg, City Domination website

C. Collberg, T. Proebsting, and A. M. Warren, Repeatability and benefaction in computer systems research, 2015.

R. M. Corless, G. H. Gonnet, D. E. Hare, D. J. Jeffrey, and D. E. Knuth, On the LambertW function, Advances in Computational Mathematics, vol.1, issue.6, pp.329-359, 1996.
DOI : 10.5186/aasfm.1983.0805

G. Danezis, S. Lewis, and R. Anderson, How much is location privacy worth, Proceedings of the 4th Workshop on the Economics of Information Security, 2005.

Y. De-montjoye, C. A. Hidalgo, M. Verleysen, and V. D. Blondel, Unique in the Crowd: The privacy bounds of human mobility, Scientific Reports, vol.23, issue.1, p.2013, 1376.
DOI : 10.1007/BF00344744

E. Deelman, K. Vahi, G. Juve, M. Rynge, S. Callaghan et al., Pegasus, a workflow management system for science automation, Future Generation Computer Systems, vol.46, issue.C, pp.4617-4652, 2015.
DOI : 10.1016/j.future.2014.10.008

URL : https://manuscript.elsevier.com/S0167739X14002015/pdf/S0167739X14002015.pdf

C. Díaz, S. Seys, J. Claessens, and B. Preneel, Towards Measuring Anonymity, Proceedings of the 2Nd International Conference on Privacy Enhancing Technologies, PET'02, pp.54-68, 2003.
DOI : 10.1007/3-540-36467-6_5

R. Dingledine, N. Mathewson, and P. Syverson, Tor: The secondgeneration onion router, Proceedings of the 13th Conference on USENIX Security Symposium, pp.21-21, 2004.
DOI : 10.21236/ada465464

URL : http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA465464&Location=U2&doc=GetTRDoc.pdf

C. Dwork, Differential Privacy, Automata, Languages and Programming, pp.1-12, 2006.
DOI : 10.1007/11787006_1

W. Enck, P. Gilbert, L. P. Byung-gon-chun, J. Cox, P. Jung et al., TaintDroid, OSDI, pp.1-6, 2010.
DOI : 10.1145/1629575.1629604

K. Fawaz and K. G. Shin, Location Privacy Protection for Smartphone Users, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, pp.239-250, 2014.
DOI : 10.1109/MWC.2012.6155874

F. Labs and . Inc, Foursquare location intelligence for enterprise Available online at https

F. Labs, . Inc, and . Foursquare-website, Available online at https

L. Franceschi-bicchierai, Redditor cracks anonymous data trove to pinpoint muslim cab drivers, 2015.

J. Freudiger, R. Shokri, and J. Hubaux, On the Optimal Placement of Mix Zones, PETS, pp.216-234, 2009.
DOI : 10.1007/978-3-642-03168-7_13

URL : http://infoscience.epfl.ch/record/138676/files/FreudigerSH09PETS.pdf?version=1

S. Gambs, M. Killijian, and M. Cortez, Next place prediction using mobility Markov chains, Proceedings of the First Workshop on Measurement, Privacy, and Mobility, MPM '12, pp.1-3
DOI : 10.1145/2181196.2181199

URL : https://hal.archives-ouvertes.fr/hal-00736947

S. Gambs, M. Killijian, and M. Cortez, GEPETO: A GEoPrivacy-Enhancing TOolkit, 2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops, pp.1071-1076, 2010.
DOI : 10.1109/WAINA.2010.170

URL : https://hal.archives-ouvertes.fr/inria-00556835

S. Gambs, M. Killijian, and M. Cortez, Show me how you move and I will tell you who you are, Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, SPRINGL '10, pp.103-126, 2011.
DOI : 10.1145/1868470.1868479

URL : https://hal.archives-ouvertes.fr/hal-00660055

S. Gambs, M. Killijian, I. Moise, M. Nunez-del-prado, and C. , MapReducing GEPETO or Towards Conducting a Privacy Analysis on Millions of Mobility Traces, 2013 IEEE International Symposium on Parallel & Distributed Processing, Workshops and Phd Forum, pp.1937-1946, 2013.
DOI : 10.1109/IPDPSW.2013.180

URL : https://hal.archives-ouvertes.fr/hal-00911238

S. Gambs, M. Killijian, and M. Cortez, De-anonymization attack on geolocated data, Journal of Computer and System Sciences, vol.80, issue.8, pp.1597-1614, 2014.
DOI : 10.1016/j.jcss.2014.04.024

URL : https://hal.archives-ouvertes.fr/hal-01242268

B. Gedik and L. Liu, Location Privacy in Mobile Systems: A Personalized Anonymization Model, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05), pp.620-629, 2005.
DOI : 10.1109/ICDCS.2005.48

URL : http://www-static.cc.gatech.edu/~lingliu/papers/2005/2005-kanom.pdf

G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K. Tan, Private queries in location based services, Proceedings of the 2008 ACM SIGMOD international conference on Management of data , SIGMOD '08, 2008.
DOI : 10.1145/1376616.1376631

G. Ghinita, P. Kalnis, and S. Skiadopoulos, PRIVE, Proceedings of the 16th international conference on World Wide Web , WWW '07, pp.371-380, 2007.
DOI : 10.1145/1242572.1242623

A. Gmbh, Aircloak website Available online at https

P. Golle and K. Partridge, On the Anonymity of Home/Work Location Pairs, PerCom, pp.390-397, 2009.
DOI : 10.1142/S0218488502001648

URL : http://crypto.stanford.edu/~pgolle/papers/commute.pdf

D. Golovin, B. Solnik, S. Moitra, G. Kochanski, J. Karro et al., Google Vizier, Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining , KDD '17, pp.1487-1495, 2017.
DOI : 10.1109/JPROC.2015.2494218

URL : http://dl.acm.org/ft_gateway.cfm?id=3098043&type=pdf

. Google, Google maps geolocation api Available online at https://developers. google.com/maps

G. Inc, Google Maps website Available online at https://maps.google. com

M. Gramaglia and M. Fiore, Hiding mobile traffic fingerprints with GLOVE, Proceedings of the 11th ACM Conference on Emerging Networking Experiments and Technologies, CoNEXT '15, pp.1-26, 2015.
DOI : 10.1016/j.ins.2012.04.015

URL : https://hal.archives-ouvertes.fr/hal-01237032

M. Gruteser and D. Grunwald, Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking, Proceedings of the 1st international conference on Mobile systems, applications and services, MobiSys '03, pp.31-42, 2003.
DOI : 10.1145/1066116.1189037

URL : http://systems.cs.colorado.edu/Papers/Generated/2003anonymousLbs.ps

S. Guha, M. Jain, and V. N. Padmanabhan, Koi: A Location- Privacy Platform for Smartphone Apps, NSDI, pp.183-196

N. Haderer, V. Primault, P. Raveneau, C. Ribeiro, R. Rouvoy et al., Towards a practical deployment of privacy-preserving crowd-sensing tasks, Proceedings of the Posters & Demos Session on, Middleware Posters and Demos '14, pp.43-44, 2014.
DOI : 10.1145/2678508.2678530

URL : https://hal.archives-ouvertes.fr/hal-01095787

N. Haderer, R. Rouvoy, and L. Seinturier, Dynamic Deployment of Sensing Experiments in the Wild Using Smartphones, 13th International IFIP Conference on Distributed Applications and Interoperable Systems, volume LNCS-7891 of DAIS '14, pp.43-56, 2013.
DOI : 10.1007/978-3-642-38541-4_4

URL : https://hal.archives-ouvertes.fr/hal-00804114

R. Hariharan and K. Toyama, Project Lachesis: Parsing and Modeling Location Histories, Geographic Information Science, pp.106-124, 2004.
DOI : 10.1007/978-3-540-30231-5_8

URL : http://www.ics.uci.edu/~rharihar/publications/hariharan-giscience2004.pdf

H. Henttu, J. Izaret, and D. Potere, Geospatial Services: A $1.6 Trillion Growth Engine for the U.S. Economy, 2012.

B. Hindman, A. Konwinski, M. Zaharia, A. Ghodsi, A. D. Joseph et al., Mesos: A platform for finegrained resource sharing in the data center, Proceedings of the 8th USENIX Conference on Networked Systems Design and Implementation, NSDI'11, pp.295-308, 2011.

B. Hoh and M. Gruteser, Protecting location privacy through path confusion, SECURECOMM, pp.194-205, 2005.

B. Hoh, M. Gruteser, H. Xiong, and A. Alrabady, Preserving privacy in gps traces via uncertainty-aware path cloaking, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.161-171, 2007.
DOI : 10.1145/1315245.1315266

J. Hsu, M. Gaboardi, A. Haeberlen, S. Khanna, A. Narayan et al., Differential Privacy: An Economic Method for Choosing Epsilon, 2014 IEEE 27th Computer Security Foundations Symposium, pp.398-410, 2014.
DOI : 10.1109/CSF.2014.35

URL : http://ieeexplore.ieee.org:80/stamp/stamp.jsp?tp=&arnumber=6957125

P. Hui, J. Crowcroft, and E. Yoneki, Bubble rap, Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing , MobiHoc '08, pp.241-250, 2008.
DOI : 10.1145/1374618.1374652

P. Hunt, M. Konar, F. P. Junqueira, and B. Reed, Zookeeper: Wait-free coordination for internet-scale systems, Proceedings of the 2010 USENIX Conference on USENIX Annual Technical Conference, USENIX- ATC'10, pp.1-14, 2010.

S. Jaiswal and A. Nandi, Trust no one, Proceedings of the second ACM SIGCOMM workshop on Networking, systems, and applications on mobile handhelds, MobiHeld '10, 2010.
DOI : 10.1145/1851322.1851336

K. Jiang, D. Shao, S. Bressan, T. Kister, and K. Tan, Publishing trajectories with differential privacy guarantees, Proceedings of the 25th International Conference on Scientific and Statistical Database Management, SSDBM, pp.1-1212, 2013.
DOI : 10.1145/2484838.2484846

R. Kato, M. Iwata, T. Hara, A. Suzuki, X. Xie et al., A dummy-based anonymization method based on user trajectory with pauses, Proceedings of the 20th International Conference on Advances in Geographic Information Systems, SIGSPATIAL '12, pp.249-258, 2012.
DOI : 10.1145/2424321.2424354

H. Kido, Y. Yanagisawa, and T. Satoh, Protection of Location Privacy using Dummies for Location-based Services, 21st International Conference on Data Engineering Workshops (ICDEW'05), p.1248, 2005.
DOI : 10.1109/ICDE.2005.269

S. Kirkpatrick, C. D. Gelatt, and M. P. Vecchi, Optimization by Simulated Annealing, Science, vol.220, issue.4598, pp.671-680, 1983.
DOI : 10.1126/science.220.4598.671

URL : http://www.cs.virginia.edu/cs432/documents/sa-1983.pdf

N. Kiukkonen, J. Blom, O. Dousse, D. Gatica-perez, and J. Laurila, Towards rich mobile phone datasets: Lausanne data collection campaign, ICPS, 2010.

H. Kriegel, P. Kröger, J. Sander, and A. Zimek, Density-based clustering, Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, vol.28, issue.3, pp.231-240, 2011.
DOI : 10.1093/comjnl/28.1.82

J. Krumm, Inference Attacks on Location Tracks, Proceedings of the 5th International Conference on Pervasive Computing, PERVASIVE'07, pp.127-143, 2007.
DOI : 10.1007/978-3-540-72037-9_8

URL : http://research.microsoft.com/en-us/um/people/jckrumm/publications 2007/inference attack refined distribute.pdf

J. Krumm, A Survey of Computational Location Privacy. Personal and Ubiquitous Computing, pp.391-399, 2009.
DOI : 10.1007/s00779-008-0212-5

URL : http://www.research.microsoft.com/~jckrumm/Publications%202008/computational%20location%20privacy%20preprint.pdf

J. Krumm, Realistic Driving Trips For Location Privacy, PerCom, pp.25-41, 2009.
DOI : 10.1080/01621459.1993.10476408

URL : http://www.research.microsoft.com/~jckrumm/Publications%202009/simtrip%20camera%20ready.pdf

J. Krumm and D. Rouhana, Placer, Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing, UbiComp '13, pp.163-172, 2013.
DOI : 10.1145/2493432.2493504

K. Juha, D. Laurila, I. A. Gatica-perez, O. Blom, T. M. Bornet et al., From big smartphone data to worldwide research: The mobile data challenge, Pervasive Mob. Comput, vol.9, issue.6, pp.752-771, 2013.

L. Leonini, É. Rivière, and P. Felber, Splay: Distributed systems evaluation made simple (or how to turn ideas into live systems in a breeze), Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation, NSDI'09, pp.185-198, 2009.

J. Leskovec and A. Krevl, SNAP Datasets: Stanford large network dataset collection Available online at http://snap, 2014.

H. Li, L. Xiong, L. Zhang, and X. Jiang, DPSynthesizer, Proceeding of the VLDB Endowment, pp.1677-1680, 2014.
DOI : 10.14778/2733004.2733059

URL : http://europepmc.org/articles/pmc4496798?pdf=render

N. Li, W. Yang, and W. Qardaji, Differentially private grids for geospatial data, Proceedings of the 2013 IEEE International Conference on Data Engineering (ICDE 2013), ICDE '13, pp.757-768, 2013.

J. Liu, E. Pacitti, P. Valduriez, and M. Mattoso, A Survey of Data-Intensive Scientific Workflow Management, Journal of Grid Computing, vol.1, issue.Webserver-Issue, pp.457-493, 2015.
DOI : 10.1109/SERVICES-1.2008.79

URL : https://hal.archives-ouvertes.fr/lirmm-01144760

X. Liu, H. Zhao, M. Pan, and H. Yue, Xiaolin Li, and Yuguang Fang. Trafficaware multiple mix zone placement for protecting location privacy, INFOCOM, pp.972-980, 2012.

W. Lu, G. Miklau, and V. Gupta, Generating private synthetic databases for untrusted system evaluation, 2014 IEEE 30th International Conference on Data Engineering, pp.652-663, 2014.
DOI : 10.1109/ICDE.2014.6816689

A. Machanavajjhala and D. Kifer, Johannes Gehrke, and Muthuramakrishnan Venkitasubramaniam. l-diversity: Privacy Beyond k-anonymity, ACM Transactions on Knowledge Discovery from Data, vol.1, issue.1, 2007.

J. Macqueen, Some methods for classification and analysis of multivariate observations, Proceedings of the Fifth Berkeley Symposium on Mathematical Statistics and Probability, pp.281-297, 1967.

S. Mascetti, D. Freni, C. Bettini, X. S. Wang, and S. Jajodia, Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies, The VLDB Journal, vol.29, issue.2, pp.541-566, 2011.
DOI : 10.1145/335191.335427

URL : http://arxiv.org/pdf/1007.0408

. Mathworks, How simulated annealing works Available online at https://fr. mathworks.com/help/gads/how-simulated-annealing-works

. Maxmind and . Maxmind-website, Available online at https

F. Mcsherry and K. Talwar, Mechanism Design via Differential Privacy, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07), pp.94-103, 2007.
DOI : 10.1109/FOCS.2007.66

D. Frank and . Mcsherry, Privacy integrated queries: An extensible platform for privacy-preserving data analysis, Proceedings of the 2009 ACM SIGMOD International Conference on Management of Data, SIGMOD '09, pp.19-30, 2009.

K. Micinski, P. Phelps, and J. S. Foster, An Empirical Study of Location Truncation on Android, MOST, pp.1-10, 2013.

J. Darakhshan, S. Mir, R. Isaacman, M. Cáceres, R. N. Martonosi et al., DP-WHERE: Differentially private modeling of human mobility, Proceedings of the 2013 IEEE International Conference on Big Data, BigData '13, pp.580-588, 2013.

P. Mohan, V. N. Padmanabhan, and R. Ramjee, Nericell: Rich monitoring of road and traffic conditions using mobile smartphones, Proceedings of the 6th ACM Conference on Embedded Network Sensor Systems, SenSys '08, pp.323-336, 2008.

M. F. Mokbel, C. Chow, and W. G. Aref, The New Casper: Query Processing for Location Services Without Compromising Privacy, VLDB, pp.763-774, 2006.

A. Montresor and M. Jelasity, PeerSim: A scalable P2P simulator, 2009 IEEE Ninth International Conference on Peer-to-Peer Computing, pp.99-100, 2009.
DOI : 10.1109/P2P.2009.5284506

URL : http://www.inf.u-szeged.hu/~jelasity/cikkek/p2p09.pdf

H. Mousa, S. B. Mokhtar, O. Hasan, O. Younes, M. Hadhoud et al., Trust management and reputation systems in mobile participatory sensing applications: A survey, Computer Networks, vol.90, issue.C, pp.9049-73, 2015.
DOI : 10.1016/j.comnet.2015.07.011

URL : https://hal.archives-ouvertes.fr/hal-01265403

M. Mun, S. Reddy, K. Shilton, N. Yau, J. Burke et al., PEIR, the personal environmental impact report, as a platform for participatory sensing systems research, Proceedings of the 7th international conference on Mobile systems, applications, and services, Mobisys '09, pp.55-68, 2009.
DOI : 10.1145/1555816.1555823

URL : http://research.cens.ucla.edu/people/estrin/resources/conferences/2009-jun-Mun-Sheddy-PEIR.pdf

A. Narayanan and V. Shmatikov, Robust De-anonymization of Large Sparse Datasets, 2008 IEEE Symposium on Security and Privacy (sp 2008), pp.111-125, 2008.
DOI : 10.1109/SP.2008.33

M. Mehmet-ercan-nergiz, Y. Atzori, and . Saygin, Towards trajectory anonymization: A generalization-based approach, SIGSPATIAL Workshops, pp.52-61, 2008.

H. Ngo and J. Kim, Location Privacy via Differential Private Perturbation of Cloaking Area, 2015 IEEE 28th Computer Security Foundations Symposium, pp.63-74, 2015.
DOI : 10.1109/CSF.2015.12

A. Noulas, S. Scellato, N. Lathia, and C. Mascolo, Mining User Mobility Features for Next Place Prediction in Location-Based Services, 2012 IEEE 12th International Conference on Data Mining, pp.1038-1043, 2012.
DOI : 10.1109/ICDM.2012.113

URL : http://www.cl.cam.ac.uk/~cm542/papers/icdm2012.pdf

. Openstreetmap, Available online at https

B. Palanisamy and L. Liu, MobiMix: Protecting location privacy with mix-zones over road networks, 2011 IEEE 27th International Conference on Data Engineering, pp.494-505, 2011.
DOI : 10.1109/ICDE.2011.5767898

URL : http://www-static.cc.gatech.edu/%7Elingliu/papers/2011/MobiMix-icde2011.pdf

S. Teja, P. , and N. Saxena, On the Limitations of Query Obfuscation Techniques for Location Privacy, UbiComp, pp.187-196, 2011.

N. Pelekis, Aris Gkoulalas-Divanis, Marios Vodas, Despina Kopanaki, and Yannis Theodoridis. Privacy-aware Querying over Sensitive Trajectory Data, CIKM, pp.895-904, 2011.

A. Petit, T. Cerqueus, S. B. Mokhtar, L. Brunie, and H. Kosch, PEAS: Private, Efficient and Accurate Web Search, 2015 IEEE Trustcom/BigDataSE/ISPA, pp.571-580, 2015.
DOI : 10.1109/Trustcom.2015.421

URL : https://hal.archives-ouvertes.fr/hal-01159179

S. Pidcock and U. Hengartner, Zerosquare: A Privacy-Friendly Location Hub for Geosocial Applications, MOST, 2013.

A. Pingley, W. Yu, N. Zhang, X. Fu, and W. Zhao, CAP: A Context-Aware Privacy Protection System for Location-Based Services, 2009 29th IEEE International Conference on Distributed Computing Systems, pp.49-57, 2009.
DOI : 10.1109/ICDCS.2009.62

URL : https://uta-ir.tdl.org/uta-ir/bitstream/10106/1045/1/umi-uta-2150.pdf

M. Piorkowski, N. Sarafijanovic-djukic, and M. Grossglauser, CRAWDAD data set epfl/mobility (v. 2009-02-24) Downloaded from http

R. Please and . Me, Available online at http://pleaserobme

R. Popa, A. J. Blumberg, H. Balakrishnan, and F. H. Li, Privacy and accountability for location-based aggregate statistics, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, pp.653-666, 2011.
DOI : 10.1145/2046707.2046781

URL : http://dspace.mit.edu/bitstream/1721.1/73157/1/Balakrishnan-Privacy%20and%20accountability.pdf

V. Primault, Accio: A location privacy framework ? Source code Available online at https://github

V. Primault, Adaptive Location Privacy with ALP ? Source code Available online at https://github
DOI : 10.1109/srds.2016.044

URL : http://arxiv.org/pdf/1609.07349

V. Primault, S. B. Mokhtar, and L. Brunie, Privacy-Preserving Publication of Mobility Data with High Utility, 2015 IEEE 35th International Conference on Distributed Computing Systems, pp.802-803, 2015.
DOI : 10.1109/ICDCS.2015.117

URL : https://hal.archives-ouvertes.fr/hal-01159291

V. Primault, S. B. Mokhtar, C. Lauradoux, and L. Brunie, Differentially Private Location Privacy in Practice, Proceedings of the 3rd Workshop on Mobile Security Technologies, p.14, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01148230

V. Primault, S. B. Mokhtar, C. Lauradoux, and L. Brunie, Time Distortion Anonymization for the Publication of Mobility Data with High Utility, 2015 IEEE Trustcom/BigDataSE/ISPA, pp.539-546, 2015.
DOI : 10.1109/Trustcom.2015.417

URL : https://hal.archives-ouvertes.fr/hal-01170060

V. Primault, A. Boutet, S. B. Mokhtar, and L. Brunie, Adaptive Location Privacy with ALP, 2016 IEEE 35th Symposium on Reliable Distributed Systems (SRDS), pp.269-278, 2016.
DOI : 10.1109/SRDS.2016.044

URL : https://hal.archives-ouvertes.fr/hal-01370447

. Priva-'mov, Priva'Mov project's website

D. Quercia, I. Leontiadis, L. Mcnamara, C. Mascolo, and J. Crowcroft, SpotME If You Can: Randomized Responses for Location Obfuscation on Mobile Phones, 2011 31st International Conference on Distributed Computing Systems, pp.363-372, 2011.
DOI : 10.1109/ICDCS.2011.79

URL : http://www.cl.cam.ac.uk/%7Ecm542/papers/icdcs2011.pdf

D. Riboni and C. Bettini, Differentially-private release of check-in data for venue recommendation, 2014 IEEE International Conference on Pervasive Computing and Communications (PerCom), pp.190-198, 2014.
DOI : 10.1109/PerCom.2014.6813960

URL : http://homes.di.unimi.it/~riboni/14-percom.pdf

A. Sadilek and J. Krumm, Far out: Predicting long-term human mobility, Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence, AAAI'12, pp.814-820, 2012.

P. Shankar, V. Ganapathy, and L. Iftode, Privately querying location-based services with SybilQuery, Proceedings of the 11th international conference on Ubiquitous computing, Ubicomp '09, pp.31-40, 2009.
DOI : 10.1145/1620545.1620550

URL : http://www.cs.rutgers.edu/~vinodg/papers/ubicomp2009/ubicomp2009.pdf

K. Sharad and G. Danezis, An Automated Social Graph De-anonymization Technique, Proceedings of the 13th Workshop on Privacy in the Electronic Society, WPES '14, pp.47-58, 2014.
DOI : 10.1145/2068816.2068825

URL : http://arxiv.org/pdf/1408.1276

G. Kang, X. Shin, Z. Ju, X. Chen, and . Hu, Privacy protection for users of location-based services, IEEE Wireless Communications, vol.19, issue.1, pp.30-39, 2012.

R. Shokri, J. Freudiger, M. Jadliwala, and J. Hubaux, A distortion-based metric for location privacy, Proceedings of the 8th ACM workshop on Privacy in the electronic society, WPES '09, pp.21-30, 2009.
DOI : 10.1145/1655188.1655192

URL : http://infoscience.epfl.ch/record/140461/files/wpes021-shokri.pdf

R. Shokri, G. Theodorakopoulos, J. Boudec, and J. Hubaux, Quantifying Location Privacy, 2011 IEEE Symposium on Security and Privacy, pp.247-262, 2011.
DOI : 10.1109/SP.2011.18

URL : https://hal.archives-ouvertes.fr/hal-01266229

J. Snoek, H. Larochelle, and R. P. Adams, Practical bayesian optimization of machine learning algorithms, Proceedings of the 25th International Conference on Neural Information Processing Systems, NIPS'12, pp.2951-2959

J. Snyman, Practical Mathematical Optimization: An Introduction to Basic Optimization Theory and Classical and New Gradient-Ba sed Algorithms Applied Optimization, 2005.
DOI : 10.1007/978-3-319-77586-9

L. Stenneth, O. Wolfson, P. S. Yu, and B. Xu, Transportation mode detection using mobile phones and GIS information, Proceedings of the 19th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, GIS '11, pp.54-63, 2011.
DOI : 10.1145/2093973.2093982

URL : http://cs.uic.edu/%7Eboxu/mp2p/acmgis11-mode-detection.pdf

L. Stenneth, P. S. Yu, and O. Wolfson, Mobile systems location privacy: “MobiPriv” a robust k anonymous system, 2010 IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications, pp.54-63, 2010.
DOI : 10.1109/WIMOB.2010.5645011

L. Sweeney, k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.2, issue.3, pp.557-570, 2002.
DOI : 10.1109/RISP.1993.287632

M. Terrovitis, Privacy preservation in the dissemination of location data, ACM SIGKDD Explorations Newsletter, vol.13, issue.1, pp.6-18, 2011.
DOI : 10.1145/2031331.2031334

D. Thain, T. Tannenbaum, and M. Livny, Distributed computing in practice: the condor experience. Concurrency -Practice and Experience, pp.323-356, 2005.
DOI : 10.1002/cpe.938

URL : http://www.cs.wisc.edu/~thain/library/condor-practice.pdf

A. Tockar, Riding with the stars: Passenger privacy in the nyc taxicab dataset. https://research.neustar.biz/2014/09/15/ riding-with-the-stars-passenger-privacy-in-the-nyc-taxicab-dataset, 2014.

E. Union, EUR-Lex ? directive 95/46/ec Available online at http: //eur-lex.europa, pp.31995-32041, 1995.

L. Waze-mobile, Waze website Available online at https

M. Wernke, P. Skvortsov, F. Dürr, and K. Rothermel, A classification of location privacy attacks and approaches, Personal and Ubiquitous Computing, vol.13, issue.2, pp.163-175, 2014.
DOI : 10.1007/s10707-008-0047-2

M. Wilde, M. Hategan, J. M. Wozniak, B. Clifford, D. S. Katz et al., Swift: A language for distributed parallel scripting, Parallel Computing, vol.37, issue.9, pp.633-652, 2011.
DOI : 10.1016/j.parco.2011.05.005

URL : http://www.mcs.anl.gov/uploads/cels/papers/P1818.pdf

Y. Xiao and L. Xiong, Protecting Locations with Differential Privacy under Temporal Correlations, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15, pp.1298-1309, 2015.
DOI : 10.1126/science.1177170

URL : http://arxiv.org/pdf/1410.5919

!. Yahoo, I. Yahoo, and !. Weather-website, Available online at https://mobile. yahoo.com/weather

C. Andrew and . Yao, Protocols for secure computations, Proceedings of the 23rd Annual Symposium on Foundations of Computer Science, SFCS '82, pp.160-164, 1982.

I. Yelp, Yelp website Available online at https

W. Tun-hao-you, W. Peng, and . Lee, Protecting moving trajectories with dummies, Proceedings of the 2007 International Conference on Mobile Data Management, MDM '07, pp.278-282, 2007.

J. Yuan, Y. Zheng, X. Xie, and G. Sun, Driving with knowledge from the physical world, Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '11, pp.316-324, 2011.
DOI : 10.1145/2020408.2020462

URL : http://research.microsoft.com/pubs/148894/Driving with Knowledge from the Physical World-kdd11.pdf

J. Yuan, Y. Zheng, C. Zhang, W. Xie, X. Xie et al., T-drive, Proceedings of the 18th SIGSPATIAL International Conference on Advances in Geographic Information Systems, GIS '10, pp.99-108, 2010.
DOI : 10.1145/1869790.1869807

H. Zang and J. Bolot, Anonymization of location data does not work, Proceedings of the 17th annual international conference on Mobile computing and networking, MobiCom '11, pp.145-156, 2011.
DOI : 10.1145/2030613.2030630

Y. Zheng, L. Liu, L. Wang, and X. Xie, Learning transportation mode from raw gps data for geographic applications on the web, Proceeding of the 17th international conference on World Wide Web , WWW '08, pp.247-256, 2008.
DOI : 10.1145/1367497.1367532

URL : http://www.ra.ethz.ch/CDstore/www2008/www2008.org/papers/pdf/p247-zhengA.pdf

Y. Zheng, L. Zhang, X. Xie, and W. Ma, Mining interesting locations and travel sequences from GPS trajectories, Proceedings of the 18th international conference on World wide web, WWW '09, pp.791-800, 2009.
DOI : 10.1145/1526709.1526816

URL : http://www2009.eprints.org/80/1/p791.pdf

G. Zhong, I. Goldberg, U. Hengartner, . Louis, and P. Lester, Three Protocols for Location Privacy, Proceedings of the 7th International Conference on Privacy Enhancing Technologies, PET'07, pp.62-76, 2007.

C. Zhou, D. Frankowski, P. Ludford, S. Shekhar, and L. Terveen, Discovering personal gazetteers, Proceedings of the 12th annual ACM international workshop on Geographic information systems , GIS '04, pp.266-273, 2004.
DOI : 10.1145/1032222.1032261