R. Dingledine, N. Mathewson, and P. F. Syverson, Tor: The second-generation onion router, USENIX Security Symposium, USENIX, pp.303-320, 2004.

O. Berthold, H. Federrath, and S. Köpsell, Web MIXes: A system for anonymous and unobservable Internet access In: Designing Privacy Enhancing Technologies, Lecture Notes in Computer Science, pp.115-129, 2001.

I. Goldberg, On the Security of the Tor Authentication Protocol, Privacy Enhancing Technologies, pp.316-331, 2006.
DOI : 10.1007/11957454_18

D. Chaum, Untraceable electronic mail, return addresses, and digital pseudonyms, Communications of the ACM, vol.4, issue.2, pp.84-88, 1981.

S. Köpsell, Vergleich der Verfahren zur Verhinderung von Replay-angriffen der Anonymisierungsdienste AN.ON und Tor, pp.183-187, 2006.

B. Westermann, R. Wendolsky, L. Pimenidis, and D. Kesdogan, Cryptographic Protocol Analysis of AN.ON, Proceedings of the 14th International Conference of Financial Cryptography and Data Security, 2010.
DOI : 10.1007/978-3-642-14577-3_11

S. Köpsell, Low Latency Anonymous Communication ??? How Long Are Users Willing to Wait?, Lecture Notes in Computer Science, vol.3995, 2006.
DOI : 10.1007/11766155_16

R. Dingledine, Tor project infrastructure updates in response to security breach. http://archives.seul.org/or, 2010.

R. Dingledine and N. Mathewson, Tor protocol specification visited 03.02, 2010.

I. Iec, Information technology ? Security techniques ? Encryption algorithms ? Part 2: Asymmetric ciphers, ISO, 2006.