A. Acquisti, R. Dingledine, and P. F. Syverson, On the Economics of Anonymity, Lecture Notes in Computer Science, vol.2742, pp.84-102, 2003.
DOI : 10.1007/978-3-540-45126-6_7

E. Androulaki, M. Raykova, S. Srivatsan, A. Stavrou, and S. M. Bellovin, PAR: Payment for Anonymous Routing, Privacy Enhancing Technologies, pp.219-236, 2008.
DOI : 10.1007/978-3-540-70630-4_14

N. Borisov, G. Danezis, P. Mittal, and P. Tabriz, Denial of service or denial of security?, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.92-102, 2007.
DOI : 10.1145/1315245.1315258

R. Bye, K. Luther, S. A. , T. Alpcan, S. Albayrak et al., Decentralized Detector Generation in Cooperative Intrusion Detection Systems, SSS, pp.37-51, 2007.
DOI : 10.1007/978-3-540-76627-8_6

D. Chaum, Untraceable electronic mail, return addresses, and digital pseudonyms, Communications of the ACM, vol.24, issue.2, pp.84-88, 1981.
DOI : 10.1145/358549.358563

Y. Chen, R. Sion, and B. Carbunar, XPay, Proceedings of the 8th ACM workshop on Privacy in the electronic society, WPES '09, pp.41-50, 2009.
DOI : 10.1145/1655188.1655195

E. Damiani, S. D. Di-vimercati, S. Paraboschi, P. Samarati, and F. Violante, A reputationbased approach for choosing reliable resources in peer-to-peer networks, ACM Conference on Computer and Communications Security, pp.207-216, 2002.

R. Dingledine, N. Mathewson, and P. F. Syverson, Tor: The second-generation onion router, USENIX Security Symposium, pp.303-320, 2004.

R. Dingledine, V. Shmatikov, and P. Syverson, Synchronous Batching: From Cascades to Free Routes, pp.186-206, 2004.
DOI : 10.1007/11423409_12

M. J. Freedman and R. Morris, Tarzan, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, pp.193-206, 2002.
DOI : 10.1145/586110.586137

D. Fudenberg and J. Tirole, Game Theory, 1991.

J. Y. Halpern and K. R. , Anonymity and information hiding in multiagent systems, Journal of Computer Security, vol.13, issue.3, pp.483-512, 2005.
DOI : 10.3233/JCS-2005-13305

URL : http://doi.org/10.3233/jcs-2005-13305

S. Hamadou, C. Palamidessi, V. Sassone, and E. Elsalamouny, Probable Innocence in the Presence of Independent Knowledge, Formal Aspects in Security and Trust, pp.141-156, 2009.
DOI : 10.1007/978-3-642-12459-4_11

N. Hopper, E. Y. Vasserman, and E. Chan-tin, How much anonymity does network latency leak?, ACM Trans. Inf. Syst. Secur, vol.13, issue.2, p.2010
DOI : 10.1145/1315245.1315257

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.154.1587

R. Jansen, N. Hopper, and Y. Kim, Recruiting new tor relays with BRAIDS, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pp.319-328, 2010.
DOI : 10.1145/1866307.1866344

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.174.1685

Y. Liu, C. Comaniciu, and H. Man, Modelling misbehaviour in ad hoc networks: a game theoretic approach for intrusion detection, International Journal of Security and Networks, vol.1, issue.3/4, pp.243-254, 2006.
DOI : 10.1504/IJSN.2006.011784

R. Ma, S. Lee, J. Lui, and D. Yau, A game theoretic approach to provide incentive and service differentiation in P2P networks, ACM SIGMETRICS Performance Evaluation Review, vol.32, issue.1, pp.189-198, 2004.
DOI : 10.1145/1012888.1005711

J. Mclachlan, A. Tran, N. Hopper, and Y. Kim, Scalable onion routing with torsk, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pp.590-599, 2009.
DOI : 10.1145/1653662.1653733

S. J. Murdoch and G. Danezis, Low-Cost Traffic Analysis of Tor, 2005 IEEE Symposium on Security and Privacy (S&P'05), pp.183-195, 2005.
DOI : 10.1109/SP.2005.12

A. Nambiar and M. Wright, Salsa, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, pp.17-26, 2006.
DOI : 10.1145/1180405.1180409

C. A. Neff, A verifiable secret shuffle and its application to e-voting, Proceedings of the 8th ACM conference on Computer and Communications Security , CCS '01, pp.116-125, 2001.
DOI : 10.1145/501983.502000

T. Ngan, R. Dingledine, and D. S. Wallach, Building Incentives into Tor, Lecture Notes in Computer Science, vol.6052, pp.238-256, 2010.
DOI : 10.1007/978-3-642-14577-3_19

M. K. Reiter and A. D. Rubin, Crowds: anonymity for Web transactions, ACM Transactions on Information and System Security, vol.1, issue.1, pp.66-92, 1998.
DOI : 10.1145/290163.290168

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.36.864

V. Sassone, S. Hamadou, and M. Yang, Trust in Anonymity Networks, Lecture Notes in Computer Science, vol.6269, pp.48-70, 2010.
DOI : 10.1007/978-3-642-15375-4_5

URL : https://hal.archives-ouvertes.fr/hal-00760437

K. Wei-lye and J. M. Wing, Game strategies in network security, International Journal of Information Security, vol.4, issue.1-2, pp.71-86, 2005.
DOI : 10.1007/s10207-004-0060-x

L. Xiong and L. Liu, PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities, IEEE Transactions on Knowledge and Data Engineering, vol.16, issue.07, pp.843-857, 2004.
DOI : 10.1109/TKDE.2004.1318566

M. Yang, V. Sassone, and S. Hamadou, A game-theoretic analysis of cooperation in anonymity networks Extended version of this paper available at http

R. Zhou and K. Hwang, Powertrust: A robust and scalable reputation system for trusted peer-to-peer computing, IEEE Trans. Parallel Distrib. Syst, vol.18, issue.4, pp.460-473, 2007.