D. Goldschlag, M. Reed, and P. Syverson, Onion routing, Communications of the ACM, vol.42, issue.2, pp.39-41, 1999.
DOI : 10.1145/293411.293443

R. Dingledine, N. Mathewson, and P. Syverson, Tor: The second-generation onion router, Proceedings of the 13th Conference on USENIX Security Symposium, pp.21-22, 2004.

H. Corrigan-gibbs and B. Ford, Dissent, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pp.340-50, 2010.
DOI : 10.1145/1866307.1866346

D. Wolinsky, H. Corrigan-gibbs, and B. Ford, Dissent in numbers: Making strong anonymity scale, Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation, pp.179-92, 2012.

B. Mokhtar, S. Berthou, G. Diarra, A. Quéma, V. Shoker et al., RAC: A Freerider-Resilient, Scalable, Anonymous Communication Protocol, 2013 IEEE 33rd International Conference on Distributed Computing Systems, pp.520-529, 2013.
DOI : 10.1109/ICDCS.2013.52

URL : https://hal.archives-ouvertes.fr/hal-00945795

J. Domingo-ferrer, A. Solanas, and J. Castellà-roca, )???private information retrieval from privacy???uncooperative queryable databases, Online Information Review, vol.33, issue.4, pp.720-764, 2009.
DOI : 10.1108/14684520910985693

V. Toubiana, L. Subramanian, and H. Nissenbaum, Trackmenot: Enhancing the privacy of web search. CoRR, 2011.

S. Peddinti and N. Saxena, Web search query privacy: Evaluating query obfuscation and anonymizing networks1, Journal of Computer Security, vol.22, issue.1, pp.155-99, 2014.
DOI : 10.3233/JCS-130491

A. Petit, T. Cerqueus, B. Mokhtar, S. Brunie, L. Kosch et al., PEAS: Private, Efficient and Accurate Web Search, 2015 IEEE Trustcom/BigDataSE/ISPA, pp.571-80, 2015.
DOI : 10.1109/Trustcom.2015.421

URL : https://hal.archives-ouvertes.fr/hal-01159179

P. Eckersley, How Unique Is Your Web Browser?, Proceedings of the 10th International Conference on Privacy Enhancing Technologies, pp.1-18, 2010.
DOI : 10.1007/978-3-642-14527-8_1

F. Saint-jean, A. Johnson, D. Boneh, and J. Feigenbaum, Private web search, Proceedings of the 2007 ACM workshop on Privacy in electronic society , WPES '07, pp.84-90, 2007.
DOI : 10.1145/1314333.1314351

M. Shapiro, Structure and Encapsulation in Distributed Systems: the Proxy Principle, Proceedings of the IEEE 6th International Conference on Distributed Computing Systems, pp.198-204, 1986.
URL : https://hal.archives-ouvertes.fr/inria-00444651

H. Seid and A. Lespagnol, Virtual private network. Google Patents. US Patent 5, p.271, 1998.

J. Castellà-roca, A. Viejo, and J. Herrera-joancomartí, Preserving user???s privacy in web search engines, Computer Communications, vol.32, issue.13-14, pp.13-141541, 2009.
DOI : 10.1016/j.comcom.2009.05.009

Y. Lindell and E. Waisbard, Private Web Search with Malicious Adversaries, Proceedings of the 10th International Conference on Privacy Enhancing Technologies, pp.220-255, 2010.
DOI : 10.1007/978-3-642-14527-8_13

R. Al-rfou, W. Jannen, and N. Patwardhan, Trackmenot-so-good-after-all. arXiv preprint

M. Murugesan and C. Clifton, Providing Privacy through Plausibly Deniable Search, Society for Industrial and Applied Mathematics, pp.768-79, 2009.
DOI : 10.1137/1.9781611972795.66

D. Rebollo-monedero and J. Forné, Optimized Query Forgery for Private Information Retrieval, IEEE Transactions on Information Theory, vol.56, issue.9, pp.4631-4673, 2010.
DOI : 10.1109/TIT.2010.2054471

S. Ye, F. Wu, R. Pandey, and H. Chen, Noise Injection for Search Privacy Protection, 2009 International Conference on Computational Science and Engineering, pp.1-8, 2009.
DOI : 10.1109/CSE.2009.77

A. Arampatzis, P. Efraimidis, and G. Drosatos, A query scrambler for search privacy on the internet, Information Retrieval, vol.53, issue.4, pp.657-79, 2013.
DOI : 10.1007/s10791-012-9212-1

H. Pang, X. Ding, and X. X. , Embellishing text search queries to protect user privacy. VLDB'10, pp.598-607, 2010.

A. Singhal, Modern information retrieval: A brief overview, IEEE Data Eng Bull, vol.24, issue.4, pp.35-43, 2001.

L. Dice, Measures of the Amount of Ecologic Association Between Species, Ecology, vol.26, issue.3, pp.297-302, 1945.
DOI : 10.2307/1932409

P. Jaccard, THE DISTRIBUTION OF THE FLORA IN THE ALPINE ZONE.1, New Phytologist, vol.11, issue.2, pp.37-50, 1912.
DOI : 10.1111/j.1469-8137.1912.tb05611.x

W. Cohen, P. Ravikumar, and S. Fienberg, A comparison of string metrics for matching names and records, Proceedings of the KDD-03 Workshop on Data Cleaning and Object Consolidation, pp.73-81, 2003.

G. Pass, A. Chowdhury, and C. Torgeson, A picture of search, Proceedings of the 1st international conference on Scalable information systems , InfoScale '06, p.1, 2006.
DOI : 10.1145/1146847.1146848

C. Manning, M. Surdeanu, J. Bauer, J. Finkel, S. Bethard et al., The Stanford CoreNLP Natural Language Processing Toolkit, Proceedings of 52nd Annual Meeting of the Association for Computational Linguistics: System Demonstrations, pp.55-60, 2014.
DOI : 10.3115/v1/P14-5010

M. Porter, An algorithm for suffix stripping, Program, vol.14, issue.3, pp.130-137, 1980.
DOI : 10.1108/eb046814

M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann et al., The WEKA data mining software, ACM SIGKDD Explorations Newsletter, vol.11, issue.1, pp.10-18, 2009.
DOI : 10.1145/1656274.1656278

M. Hearst, S. Dumais, E. Osman, J. Platt, and B. Scholkopf, Support vector machines, IEEE Intelligent Systems and their Applications, vol.13, issue.4, pp.18-28, 1998.
DOI : 10.1109/5254.708428