D. Catalano and D. Fiore, Practical Homomorphic MACs for Arithmetic Circuits, Advances in Cryptology ? EUROCRYPT 2013, pp.336-352, 2013.
DOI : 10.1007/978-3-642-38348-9_21

D. L. Chaum, Untraceable electronic mail, return addresses, and digital pseudonyms, Communications of the ACM, vol.24, issue.2, pp.84-90, 1981.
DOI : 10.1145/358549.358563

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.128.8210

I. Chlamtac, M. Conti, and J. J. Liu, Mobile ad hoc networking: imperatives and challenges, Ad Hoc Networks, vol.1, issue.1, pp.13-64, 2003.
DOI : 10.1016/S1570-8705(03)00013-1

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.108.4069

W. A. Cohn, Yahoo's china defense, The New Presence, vol.9, issue.3, pp.30-33, 2007.

I. Damgård and M. Jurik, A Generalisation, a Simplification and some Applications of Paillier???s Probabilistic Public-Key System, Public Key Cryptography, pp.119-136, 1992.
DOI : 10.7146/brics.v7i45.20212

G. Danezis, R. Dingledine, and N. Mathewson, Mixminion: design of a type III anonymous remailer protocol, Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405), 2003.
DOI : 10.1109/SECPRI.2003.1199323

C. Diaz and B. Preneel, Taxonomy of Mixes and Dummy Traffic, Information Security Management, Education and Privacy, IFIP International Federation for Information Processing, pp.217-232, 2004.
DOI : 10.1007/1-4020-8145-6_18

R. Dingledine, N. Mathewson, and P. Syverson, Tor: The second-generation onion router, Proceedings of the 13th Conference on USENIX Security Symposium. SSYM'04, pp.21-21, 2004.