Addressing the Beacon Re-Identification Attacks: Quantification and Mitigation of Privacy