J. Krumm, Inference Attacks on Location Tracks, Proceedings of the 5th International Conference on Pervasive Computing, pp.127-143, 2007.
DOI : 10.1007/978-3-540-72037-9_8

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.491.4925

S. Gambs, M. Killijian, M. N. Del-prado, and C. , Show me how you move and I will tell you who you are, Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, SPRINGL '10, pp.103-126, 2011.
DOI : 10.1145/1868470.1868479

URL : https://hal.archives-ouvertes.fr/inria-00556833

A. Pingley, W. Yu, N. Zhang, X. Fu, and W. Zhao, CAP: A Context-Aware Privacy Protection System for Location-Based Services, 2009 29th IEEE International Conference on Distributed Computing Systems, pp.49-57, 2009.
DOI : 10.1109/ICDCS.2009.62

P. Shankar, V. Ganapathy, and L. Iftode, Privately Querying Locationbased Services with SybilQuery, Proceedings of the 11th International Conference on Ubiquitous Computing, pp.31-40, 2009.
DOI : 10.1145/1620545.1620550

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.535.3749

M. F. Mokbel, C. Chow, and W. G. Aref, The New Casper: Query Processing for Location Services Without Compromising Privacy, Proceedings of the 32nd International Conference on Very Large Data Bases. VLDB Endowment, pp.763-774, 2006.

M. E. Andrés, N. E. Bordenabe, K. Chatzikokolakis, and C. Palamidessi, Geo-indistinguishability, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, pp.901-914, 2013.
DOI : 10.1145/2508859.2516735

C. and D. Automata, Differential Privacy Languages and Programming , ser. Lecture Notes in Computer Science, pp.1-12, 2006.

M. Piorkowski, N. Sarafijanovic-djukic, and M. Grossglauser, CRAW- DAD data set epfl/mobility (v. 2009-02-24)

Y. Zheng, X. Xie, and W. Ma, GeoLife: A Collaborative Social Networking Service among User, location and trajectory, IEEE Data Engineering Bulletin, vol.33, issue.2, pp.32-40, 2010.
DOI : 10.1109/mdm.2009.50

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.187.8464

C. Zhou, D. Frankowski, P. Ludford, S. Shekhar, and L. Terveen, Discovering personal gazetteers, Proceedings of the 12th annual ACM international workshop on Geographic information systems , GIS '04, pp.266-273, 2004.
DOI : 10.1145/1032222.1032261

R. Hariharan and K. Toyama, Project Lachesis: Parsing and Modeling Location Histories, Geographic Information Science, pp.106-124, 2004.
DOI : 10.1007/978-3-540-30231-5_8

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.131.9543

J. P. Achara, F. Baudot, C. Castelluccia, G. Delcroix, and V. Roca, Mobilitics: Analyzing Privacy Leaks in Smartphones, ERCIM News, vol.2013, issue.93, 2013.
URL : https://hal.archives-ouvertes.fr/hal-00917417

S. Gambs, M. Killijian, M. N. , and P. Cortez, Next place prediction using mobility Markov chains, Proceedings of the First Workshop on Measurement, Privacy, and Mobility, MPM '12, pp.1-3, 2012.
DOI : 10.1145/2181196.2181199

URL : https://hal.archives-ouvertes.fr/hal-00736947

K. Jiang, D. Shao, S. Bressan, T. Kister, and K. Tan, Publishing trajectories with differential privacy guarantees, Proceedings of the 25th International Conference on Scientific and Statistical Database Management, SSDBM, pp.1-1212, 2013.
DOI : 10.1145/2484838.2484846

S. Ho and S. Ruan, Differential privacy for location pattern mining, Proceedings of the 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, SPRINGL '11, pp.17-24, 2011.
DOI : 10.1145/2071880.2071884

Y. Zheng, Q. Li, Y. Chen, X. Xie, and W. Ma, Understanding mobility based on GPS data, Proceedings of the 10th international conference on Ubiquitous computing, UbiComp '08, pp.312-321, 2008.
DOI : 10.1145/1409635.1409677

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.547.7176

Y. Zheng, L. Zhang, X. Xie, and W. Ma, Mining interesting locations and travel sequences from GPS trajectories, Proceedings of the 18th international conference on World wide web, WWW '09, pp.791-800, 2009.
DOI : 10.1145/1526709.1526816

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.465.686

Y. De-montjoye, C. A. Hidalgo, M. Verleysen, and V. D. Blondel, Unique in the Crowd: The privacy bounds of human mobility, Scientific Reports, vol.23, issue.1376, 2013.
DOI : 10.1038/srep01376

R. Shokri, G. Theodorakopoulos, J. Boudec, and J. Hubaux, Quantifying Location Privacy, 2011 IEEE Symposium on Security and Privacy, pp.247-262, 2011.
DOI : 10.1109/SP.2011.18

URL : https://hal.archives-ouvertes.fr/hal-01266229

K. Micinski, P. Phelps, and J. S. Foster, An Empirical Study of Location Truncation on Android, Proceedings of the 2013 Mobile Security Technologies Conference, pp.1-10, 2013.

S. Gambs, M. Killijian, M. N. Del-prado, and C. , GEPETO: A GEoPrivacy-Enhancing TOolkit, 2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops, pp.1071-1076, 2010.
DOI : 10.1109/WAINA.2010.170

URL : https://hal.archives-ouvertes.fr/inria-00556835

P. Golle and K. Partridge, On the Anonymity of Home/Work Location Pairs, Proceedings of the 7th International Conference on Pervasive Computing, pp.390-397, 2009.
DOI : 10.1007/978-3-642-01516-8_26