D. Goldschlag, M. Reed, and P. Syverson, Onion routing, Communications of the ACM, vol.42, issue.2, 1999.
DOI : 10.1145/293411.293443

R. Dingledine, N. Mathewson, and P. Syverson, TOR: The second generation onion router, Usenix Security Symposium, 2004.

D. I. Wolinsky, H. Corrigan-gibbs, and B. Ford, Dissent in numbers: Making strong anonymity scale, Proceedings of OSDI, 2012.

S. B. Mokhtar, G. Berthou, A. Diarra, V. Quéma, and A. Shoker, RAC: A Freerider-Resilient, Scalable, Anonymous Communication Protocol, 2013 IEEE 33rd International Conference on Distributed Computing Systems, 2013.
DOI : 10.1109/ICDCS.2013.52

URL : https://hal.archives-ouvertes.fr/hal-00945795

S. T. Peddinti and N. Saxena, On the effectiveness of anonymizing networks for web search privacy, Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS '11, pp.483-489, 2011.
DOI : 10.1145/1966913.1966984

V. Toubiana, L. Subramanian, and H. Nissenbaum, Trackmenot: Enhancing the privacy of web search, 2011.

J. Domingo-ferrer, A. Solanas, and J. Castelì-a-roca, )???private information retrieval from privacy???uncooperative queryable databases, Online Information Review, vol.33, issue.4, pp.720-744, 2009.
DOI : 10.1108/14684520910985693

M. Murugesan and C. Clifton, Providing Privacy through Plausibly Deniable Search, pp.768-779, 2009.
DOI : 10.1137/1.9781611972795.66

H. Pang, X. Ding, and X. Xiao, Embellishing text search queries to protect user privacy, Proceedings of the VLDB Endowment, pp.598-607, 2010.
DOI : 10.14778/1920841.1920918

B. Blanchet, An efficient cryptographic protocol verifier based on prolog rules, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., 2001.
DOI : 10.1109/CSFW.2001.930138

G. Pass, A. Chowdhury, and C. Torgeson, A picture of search, Proceedings of the 1st international conference on Scalable information systems , InfoScale '06, 2006.
DOI : 10.1145/1146847.1146848

M. Shapiro, Structure and Encapsulation in Distributed Systems: the Proxy Principle, Proceedings of ICDCS, 1986.
URL : https://hal.archives-ouvertes.fr/inria-00444651

J. Castelì-a-roca, A. Viejo, and J. Herrera-joancomartí, Preserving user???s privacy in web search engines, Computer Communications, vol.32, issue.13-14, 2009.
DOI : 10.1016/j.comcom.2009.05.009

Y. Lindell and E. Waisbard, Private Web Search with Malicious Adversaries, Proceedings of PETS, pp.220-235, 2010.
DOI : 10.1007/978-3-642-14527-8_13

R. Al-rfou, W. Jannen, and N. Patwardhan, Trackmenot-so-good-afterall, 2012.

D. Rebollo-monedero and J. Forné, Optimized query forgery for private information retrieval Information Theory, IEEE Transactions on, vol.56, issue.9, pp.4631-4642, 2010.

S. Ye, F. Wu, R. Pandey, and H. Chen, Noise Injection for Search Privacy Protection, 2009 International Conference on Computational Science and Engineering, pp.1-8, 2009.
DOI : 10.1109/CSE.2009.77

A. Arampatzis, P. S. Efraimidis, and G. Drosatos, A query scrambler for search privacy on the internet, Information Retrieval, vol.53, issue.4, pp.657-679, 2013.
DOI : 10.1007/s10791-012-9212-1

M. Juarez and V. Torra, DisPA: An Intelligent Agent for Private Web Search, Advanced Research in Data Privacy, pp.389-405, 2015.
DOI : 10.1007/978-3-319-09885-2_21

M. Barbaro, T. Zeller, and S. Hansell, A face is exposed for aol searcher no. 4417749, New York Times, vol.9, p.8, 2006.

C. Bron and J. Kerbosch, Algorithm 457: finding all cliques of an undirected graph, Communications of the ACM, vol.16, issue.9, pp.575-577, 1973.
DOI : 10.1145/362342.362367

G. Inc, Google trends, 2012.

S. Guha, M. Jain, and V. N. Padmanabhan, Koi: A location-privacy platform for smartphone apps, NSDI, pp.183-196, 2012.

A. Petit, S. B. Mokhtar, L. Brunie, and H. Kosch, Towards efficient and accurate privacy preserving web search, Proceedings of the 9th Workshop on Middleware for Next Generation Internet Computing, MW4NG '14, 2014.
DOI : 10.1145/2676733.2676734

URL : https://hal.archives-ouvertes.fr/hal-01301099