R. Dingledine, N. Mathewson, and P. Syverson, Tor: The Second- Generation Onion Router, Proceedings of the 13th USENIX Security Symposium, USENIX '04, 2004.

P. Manils, A. Chaabane, S. Le-blond, M. A. Kaafar, C. Castelluccia et al., Compromising Tor Anonymity Exploiting P2P Information Leakage, Proceedings of the 3rd Hot Topics in Privacy Enhancing Technologies, HotPETs '10, 2010.
URL : https://hal.archives-ouvertes.fr/inria-00471556

P. Stevens-le-blond, A. Manils, M. A. Chaabane, C. Kaafar, and . Castelluccia, Arnaud Legout, and Walid Dabbous. One bad apple spoils the bunch: exploiting P2P applications to trace and profile Tor users, Proceedings of the 4th USENIX Conference on Large-scale Exploits and Emergent Threats, 2011.

A. Pfitzmann and M. Köhntopp, Anonymity, Unobservability, and Pseudonymity ??? A Proposal for Terminology, Proccedings of the International Workshop on Designing Privacy Enhancing Technologies: Design Issues in Anonymity and Unobservability, 2001.
DOI : 10.1007/3-540-44702-4_1

B. Cohen, Incentives Build Robustness in BitTorrent, Proceedings of the 1st Workshop on Economics of Peer-to-Peer Systems, 2003.

I. Clarke, O. Sandberg, B. Wiley, and T. W. Hong, Freenet: A Distributed Anonymous Information Storage and Retrieval System, Proceedings of the International Workshop on Designing Privacy Enhancing Technologies: Design Issues in Anonymity and Unobservability, 2001.
DOI : 10.1007/3-540-44702-4_4

K. Bennett, C. Grothoff, T. Horozov, I. Patrascu, and T. Stef, GNUnet -A truly anonymous networking infrastructure, Proceedings Proc. Privacy Enhancing Technologies Workshop (PET), PET '02, 2002.

O. Berthold, H. Federrath, and S. Kpsell, Web MIXes: A System for Anonymous and Unobservable Internet Access, Proceedings of the International Workshop on Designing Privacy Enhancing Technologies: Design Issues in Anonymity and Unobservability, 2001.
DOI : 10.1007/3-540-44702-4_7

D. Goldschlag, M. Reed, and P. Syverson, Hiding Routing information, Proceedings of the 1st International Workshop on Information Hiding, IH '96, 1996.
DOI : 10.1007/3-540-61996-8_37

T. Isdal, M. Piatek, A. Krishnamurthy, and T. Anderson, Privacy-preserving P2P data sharing with OneSwarm, Proceedings of the ACM SIGCOMM 2010 Conference, SIGCOMM '10, 2010.

S. Prusty, B. N. Levine, and M. Liberatore, Forensic investigation of the OneSwarm anonymous filesharing system, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, 2011.
DOI : 10.1145/2046707.2046731