On the Economics of Anonymity, Lecture Notes in Computer Science, vol.2742, pp.84-102, 2003. ,
DOI : 10.1007/978-3-540-45126-6_7
PAR: Payment for Anonymous Routing, Privacy Enhancing Technologies, pp.219-236, 2008. ,
DOI : 10.1007/978-3-540-70630-4_14
Denial of service or denial of security?, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.92-102, 2007. ,
DOI : 10.1145/1315245.1315258
Decentralized Detector Generation in Cooperative Intrusion Detection Systems, SSS, pp.37-51, 2007. ,
DOI : 10.1007/978-3-540-76627-8_6
Untraceable electronic mail, return addresses, and digital pseudonyms, Communications of the ACM, vol.24, issue.2, pp.84-88, 1981. ,
DOI : 10.1145/358549.358563
XPay, Proceedings of the 8th ACM workshop on Privacy in the electronic society, WPES '09, pp.41-50, 2009. ,
DOI : 10.1145/1655188.1655195
A reputationbased approach for choosing reliable resources in peer-to-peer networks, ACM Conference on Computer and Communications Security, pp.207-216, 2002. ,
Tor: The second-generation onion router, USENIX Security Symposium, pp.303-320, 2004. ,
Synchronous Batching: From Cascades to Free Routes, pp.186-206, 2004. ,
DOI : 10.1007/11423409_12
Tarzan, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, pp.193-206, 2002. ,
DOI : 10.1145/586110.586137
Game Theory, 1991. ,
Anonymity and information hiding in multiagent systems, Journal of Computer Security, vol.13, issue.3, pp.483-512, 2005. ,
DOI : 10.3233/JCS-2005-13305
URL : http://doi.org/10.3233/jcs-2005-13305
Probable Innocence in the Presence of Independent Knowledge, Formal Aspects in Security and Trust, pp.141-156, 2009. ,
DOI : 10.1007/978-3-642-12459-4_11
How much anonymity does network latency leak?, ACM Trans. Inf. Syst. Secur, vol.13, issue.2, p.2010 ,
DOI : 10.1145/1315245.1315257
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.154.1587
Recruiting new tor relays with BRAIDS, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pp.319-328, 2010. ,
DOI : 10.1145/1866307.1866344
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.174.1685
Modelling misbehaviour in ad hoc networks: a game theoretic approach for intrusion detection, International Journal of Security and Networks, vol.1, issue.3/4, pp.243-254, 2006. ,
DOI : 10.1504/IJSN.2006.011784
A game theoretic approach to provide incentive and service differentiation in P2P networks, ACM SIGMETRICS Performance Evaluation Review, vol.32, issue.1, pp.189-198, 2004. ,
DOI : 10.1145/1012888.1005711
Scalable onion routing with torsk, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pp.590-599, 2009. ,
DOI : 10.1145/1653662.1653733
Low-Cost Traffic Analysis of Tor, 2005 IEEE Symposium on Security and Privacy (S&P'05), pp.183-195, 2005. ,
DOI : 10.1109/SP.2005.12
Salsa, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, pp.17-26, 2006. ,
DOI : 10.1145/1180405.1180409
A verifiable secret shuffle and its application to e-voting, Proceedings of the 8th ACM conference on Computer and Communications Security , CCS '01, pp.116-125, 2001. ,
DOI : 10.1145/501983.502000
Building Incentives into Tor, Lecture Notes in Computer Science, vol.6052, pp.238-256, 2010. ,
DOI : 10.1007/978-3-642-14577-3_19
Crowds: anonymity for Web transactions, ACM Transactions on Information and System Security, vol.1, issue.1, pp.66-92, 1998. ,
DOI : 10.1145/290163.290168
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.36.864
Trust in Anonymity Networks, Lecture Notes in Computer Science, vol.6269, pp.48-70, 2010. ,
DOI : 10.1007/978-3-642-15375-4_5
URL : https://hal.archives-ouvertes.fr/hal-00760437
Game strategies in network security, International Journal of Information Security, vol.4, issue.1-2, pp.71-86, 2005. ,
DOI : 10.1007/s10207-004-0060-x
PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities, IEEE Transactions on Knowledge and Data Engineering, vol.16, issue.07, pp.843-857, 2004. ,
DOI : 10.1109/TKDE.2004.1318566
A game-theoretic analysis of cooperation in anonymity networks Extended version of this paper available at http ,
Powertrust: A robust and scalable reputation system for trusted peer-to-peer computing, IEEE Trans. Parallel Distrib. Syst, vol.18, issue.4, pp.460-473, 2007. ,