Onion routing, Communications of the ACM, vol.42, issue.2, pp.39-41, 1999. ,
DOI : 10.1145/293411.293443
Tor: The second-generation onion router, Proceedings of the 13th Conference on USENIX Security Symposium, pp.21-22, 2004. ,
Dissent, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pp.340-50, 2010. ,
DOI : 10.1145/1866307.1866346
Dissent in numbers: Making strong anonymity scale, Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation, pp.179-92, 2012. ,
RAC: A Freerider-Resilient, Scalable, Anonymous Communication Protocol, 2013 IEEE 33rd International Conference on Distributed Computing Systems, pp.520-529, 2013. ,
DOI : 10.1109/ICDCS.2013.52
URL : https://hal.archives-ouvertes.fr/hal-00945795
)???private information retrieval from privacy???uncooperative queryable databases, Online Information Review, vol.33, issue.4, pp.720-764, 2009. ,
DOI : 10.1108/14684520910985693
Trackmenot: Enhancing the privacy of web search. CoRR, 2011. ,
Web search query privacy: Evaluating query obfuscation and anonymizing networks1, Journal of Computer Security, vol.22, issue.1, pp.155-99, 2014. ,
DOI : 10.3233/JCS-130491
PEAS: Private, Efficient and Accurate Web Search, 2015 IEEE Trustcom/BigDataSE/ISPA, pp.571-80, 2015. ,
DOI : 10.1109/Trustcom.2015.421
URL : https://hal.archives-ouvertes.fr/hal-01159179
How Unique Is Your Web Browser?, Proceedings of the 10th International Conference on Privacy Enhancing Technologies, pp.1-18, 2010. ,
DOI : 10.1007/978-3-642-14527-8_1
Private web search, Proceedings of the 2007 ACM workshop on Privacy in electronic society , WPES '07, pp.84-90, 2007. ,
DOI : 10.1145/1314333.1314351
Structure and Encapsulation in Distributed Systems: the Proxy Principle, Proceedings of the IEEE 6th International Conference on Distributed Computing Systems, pp.198-204, 1986. ,
URL : https://hal.archives-ouvertes.fr/inria-00444651
Virtual private network. Google Patents. US Patent 5, p.271, 1998. ,
Preserving user???s privacy in web search engines, Computer Communications, vol.32, issue.13-14, pp.13-141541, 2009. ,
DOI : 10.1016/j.comcom.2009.05.009
Private Web Search with Malicious Adversaries, Proceedings of the 10th International Conference on Privacy Enhancing Technologies, pp.220-255, 2010. ,
DOI : 10.1007/978-3-642-14527-8_13
Trackmenot-so-good-after-all. arXiv preprint ,
Providing Privacy through Plausibly Deniable Search, Society for Industrial and Applied Mathematics, pp.768-79, 2009. ,
DOI : 10.1137/1.9781611972795.66
Optimized Query Forgery for Private Information Retrieval, IEEE Transactions on Information Theory, vol.56, issue.9, pp.4631-4673, 2010. ,
DOI : 10.1109/TIT.2010.2054471
Noise Injection for Search Privacy Protection, 2009 International Conference on Computational Science and Engineering, pp.1-8, 2009. ,
DOI : 10.1109/CSE.2009.77
A query scrambler for search privacy on the internet, Information Retrieval, vol.53, issue.4, pp.657-79, 2013. ,
DOI : 10.1007/s10791-012-9212-1
Embellishing text search queries to protect user privacy. VLDB'10, pp.598-607, 2010. ,
Modern information retrieval: A brief overview, IEEE Data Eng Bull, vol.24, issue.4, pp.35-43, 2001. ,
Measures of the Amount of Ecologic Association Between Species, Ecology, vol.26, issue.3, pp.297-302, 1945. ,
DOI : 10.2307/1932409
THE DISTRIBUTION OF THE FLORA IN THE ALPINE ZONE.1, New Phytologist, vol.11, issue.2, pp.37-50, 1912. ,
DOI : 10.1111/j.1469-8137.1912.tb05611.x
A comparison of string metrics for matching names and records, Proceedings of the KDD-03 Workshop on Data Cleaning and Object Consolidation, pp.73-81, 2003. ,
A picture of search, Proceedings of the 1st international conference on Scalable information systems , InfoScale '06, p.1, 2006. ,
DOI : 10.1145/1146847.1146848
The Stanford CoreNLP Natural Language Processing Toolkit, Proceedings of 52nd Annual Meeting of the Association for Computational Linguistics: System Demonstrations, pp.55-60, 2014. ,
DOI : 10.3115/v1/P14-5010
An algorithm for suffix stripping, Program, vol.14, issue.3, pp.130-137, 1980. ,
DOI : 10.1108/eb046814
The WEKA data mining software, ACM SIGKDD Explorations Newsletter, vol.11, issue.1, pp.10-18, 2009. ,
DOI : 10.1145/1656274.1656278
Support vector machines, IEEE Intelligent Systems and their Applications, vol.13, issue.4, pp.18-28, 1998. ,
DOI : 10.1109/5254.708428