J. Miller and J. Mukerji, (2003, June 12). MDA Guide Version 1.0.1 . [Online]. Available: www.omg.org/cgi-bin/doc?omg/03-06-01 [February 10, 2016].
 J. Osis, “Software Development with Topological Model in the Framework of MDA,” in Proc. of the 9th CAiSE/IFIP8.1/EUNO Int. Workshop on Evaluation of Modeling Methods in Systems Analysis and Design (EMMSAD’2004) in connection with the CAiSE’2004 . vol. 1, Riga: RTU, 2004, pp. 211–220.
 J. Osis and E. Asnina, “Is Modeling a Treatment for the Weakness of Software Engineering
Oksana Nikiforova, Ludmila Kozacenko and Dace Ahilcenoka
International Conference on Evaluation of Novel Approaches to Software Engineering, June 8-11, 2011, Beijing, China. SciTePress Digital Library 2011.
 T. Poranen, E. Makinen and J. Nummenmaa, How to Draw a Sequence Diagram : SPLST'03 Proceedings of the Eighth Symposium on Programming Languages and Software Tools, June 17-18, 2003, Kuopio, Finland. University of Kuopio, Department of Computer Science 2003.
 B.E. Goldstein, Sensation and Perception. Wadsworth, 2002.
 [Battista u.c.1999] G. di Battista, P. Eades
Jonathan Rusert, Osama Khalid, Dat Hong, Zubair Shafiq and Padmini Srinivasan
. Huguenin, U. Hengartner, and J.-P. Hubaux. On the privacy implications of location semantics. Proceedings on Privacy Enhancing Technologies , 2016(4):165–183, 2016.
 M. Allen. Health Insurers Are Vacuuming Up Details About You – And It Could Raise Your Rates, NPR. https://www.npr.org/sections/health-shots/2018/07/17/629441555/health-insurers-are-vacuuming-up-details-about-you-and-it-could-raise-your-rates , 2018.
 J. Bakerman, K. Pazdernik, A. Wilson, G. Fairchild, and R. Bahran. Twitter geolocation: A hybrid approach. ACM Transactions on Knowledge
David Fifield, Chang Lan, Rod Hynes, Percy Wegmann and Vern Paxson
. Mathewson. Pluggable transport specification, Oct. 2010. https://gitweb.torproject.org/torspec.git/tree/pt-spec.txt .
 ASL19 and Psiphon. Information controls: Iran’s presidential elections. Technical report, 2013. https://asl19.org/cctr/iran-2013election-report/ .
 D. J. Bernstein, T. Lange, and P. Schwabe. Public-key authenticated encryption: crypto_box, Aug. 2010. http://nacl.cr.yp.to/box.html .
 B. Boe. Bypassing Gogo’s inflight Internet authentication, Mar. 2012. http://bryceboe.com/2012/03/12/bypassing
Chad Spensky, Jeffrey Stewart, Arkady Yerukhimovich, Richard Shay, Ari Trachtenberg, Rick Housley and Robert K. Cunningham
 I. Leontiadis, C. Efstratiou, M. Picone, and C. Mascolo, “Don’t kill my ads!: balancing privacy in an ad-supported mobile application market,” in MobiSys 2012.
 B. Ur, P. G. Leon, L. F. Cranor, R. Shay, and Y. Wang, “Smart, useful, scary, creepy: perceptions of online behavioral advertising,” in SOUPS 2012.
 Z. Xu, K. Bai, and S. Zhu, “Taplogger: Inferring user inputs on smartphone touchscreens using on-board motion sensors,” in WiSec 2012.
 L. Cai and H. Chen
Census Data Release. http://reports.opendataenterprise.org/2016opendataroundtables.pdf . Published: Summer 2016.
 Why the Census Bureau Adopted Differential Privacy for the 2020 Census of Population. https://privacytools.seas.harvard.edu/why-census-bureau-adopted-differential-privacy-2020-census-population .
 IBM systems cryptographic hardware products. http://www-03.ibm.com/security/cryptocards/ , 2016.
 Michael Backes, Aniket Kate, Matteo Maffei, and Kim Pecina. Obliviad: Provably secure and practical online behavioral advertising. In
Systems and Applications , HotMobile ’11, New York, NY, USA, 2011. ACM.
 Igor Bilogrevic, Kévin Huguenin, Berker Agir, Murtuza Jadliwala, Maria Gazaki, and Jean-Pierre Hubaux. A machine-learning based approach to privacy-aware information-sharing in mobile social networks. Pervasive and Mobile Computing , 25, 2016.
 V. Bindschaedler and R. Shokri. Synthesizing plausible privacy-preserving location traces. In 2016 IEEE Symposium on Security and Privacy (SP) , May 2016.
 Kenneth Block, Sashank Narain, and Guevara Noubir. An autonomic and
Sazzadur Rahaman, Long Cheng, Danfeng Daphne Yao, He Li and Jung-Min Jerry Park
signatures: Formal definitions, simplified requirements, and a construction based on general assumptions. In EUROCRYPT ’03 , pages 614–629, 2003.
 Daniel Slamanig, Raphael Spreitzer, and Thomas Unterluggauer. Group signatures with linking-based revocation: A pragmatic approach for efficient revocation checks. In MyCrypt 2016 , 2016. to appear.
 Julien Bringer and Alain Patey. Backward unlinkability for a VLR group signature scheme with efficient revocation check. IACR Cryptology ePrint Archive , 2011:376, 2011.
 Toru Nakanishi, Hiroki Fujii
 John Travis Butler and Arvin Agah. 2001. Psychological effects of behavior patterns of a mobile personal robot. Autonomous Robots 10, 2 (2001), 185-202.
 Ryan Calo. 2011. The drone as privacy catalyst. Stanford Law Review Online 64 (2011), 29-33.
 Ann Cavoukian. 2012. Privacy and drones: Unmanned aerial vehicles. Information and Privacy Commissioner of Ontario, Canada.
 Reece A Clothier, Dominique A Greer, Duncan G Greer, and Amisha M Mehta. 2015. Risk perception and the public acceptance of drones