Zipf's Law and the Internet, Glottometrics, vol.3, pp.143-150, 2002. ,
Probabilistic treatment of MIXes to hamper traffic analysis, Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405), p.16, 2003. ,
DOI : 10.1109/SECPRI.2003.1199324
Web MIXes: A System for Anonymous and Unobservable Internet Access, Designing Privacy Enhancing Technologies, pp.115-129, 2001. ,
DOI : 10.1007/3-540-44702-4_7
Dummy Traffic against Long Term Intersection Attacks, Privacy Enhancing Technologies, pp.110-128, 2003. ,
DOI : 10.1007/3-540-36467-6_9
On the asymptotic behavior of the number of trials necessary to complete a set with random selection, Journal of Mathematical Analysis and Applications, vol.7, issue.1, pp.31-61, 1963. ,
DOI : 10.1016/0022-247X(63)90076-3
Web caching and Zipf-like distributions: evidence and implications, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320), pp.126-134, 1999. ,
DOI : 10.1109/INFCOM.1999.749260
Untraceable electronic mail, return addresses, and digital pseudonyms, Communications of the ACM, vol.24, issue.2, pp.84-88, 1981. ,
DOI : 10.1145/358549.358563
Statistical Disclosure Attacks, Proceedings of Security and Privacy in the Age of Uncertainty, pp.421-426, 2003. ,
DOI : 10.1007/978-0-387-35691-4_40
Better Anonymous Communications, 2004. ,
Two-Sided Statistical Disclosure Attack, Privacy Enhancing Technologies, pp.30-44, 2007. ,
DOI : 10.1007/978-3-540-75551-7_3
Statistical Disclosure or Intersection Attacks on Anonymity Systems, Information Hiding, pp.293-308, 2005. ,
DOI : 10.1007/978-3-540-30114-1_21
Vida: How to Use Bayesian Inference to De-anonymize Persistent Communications, Privacy Enhancing Technologies, pp.56-72, 2009. ,
DOI : 10.1007/978-3-642-03168-7_4
Tor: The Second-Generation Onion Router, Proceedings of the 13th USENIX Security Symposium, pp.303-320, 2004. ,
Computers and Intractability: A Guide to the Theory of NP- Completeness, Freeman, 1990. ,
A caching relay for the World Wide Web, Computer Networks and ISDN Systems, vol.27, issue.2, pp.165-173, 1994. ,
DOI : 10.1016/0169-7552(94)90130-9
Fundamental limits on the anonymity provided by the MIX technique, 2006 IEEE Symposium on Security and Privacy (S&P'06), pp.86-99, 2006. ,
DOI : 10.1109/SP.2006.17
The Hitting Set Attack on Anonymity Protocols, Information Hiding, pp.326-339, 2004. ,
DOI : 10.1007/978-3-540-30114-1_23
The Lower Bound of Attacks on Anonymity Systems ??? A Unicity Distance Approach, Quality of Protection, Advances in Information Security, pp.145-158, 2006. ,
DOI : 10.1007/978-0-387-36584-8_12
Entwicklung und Betrieb eines Anonymisierungsdienstes für das WWW, 2010. ,
Practical Traffic Analysis: Extending and Resisting Statistical Disclosure, Privacy Enhancing Technologies, pp.17-34, 2005. ,
DOI : 10.1007/11423409_2
Entropy Bounds for Traffic Confirmation Cryptology ePrint Archive, Report, vol.365, 2008. ,
A Least Squares Approach to the Static Traffic Analysis of High-Latency Anonymous Communication Systems. Information Forensics and Security, IEEE Transactions on, vol.9, issue.9, pp.1341-1355, 2014. ,
Understanding Statistical Disclosure: A Least Squares Approach, Privacy Enhancing Technologies, pp.38-57, 2012. ,
DOI : 10.1007/978-3-642-31680-7_3
Anonymity, Unobservability, Pseudonymity, and Identity Management ? A Proposal for Terminology, pp.0-34, 2010. ,
Towards Practical and Fundamental Limits of Anonymity Protection, 2013. ,
A Combinatorial Approach for an Anonymity Metric, Information Security and Privacy, pp.26-43, 2009. ,
DOI : 10.1007/3-540-36415-3_4
A Practical Complexity-Theoretic Analysis of Mix Systems, Computer Security ESORICS 2011, pp.508-527, 2011. ,
DOI : 10.1007/978-3-642-23822-2_28
Analysis of the Anonymity Set of Chaumian Mixes, 13th Nordic Workshop on Secure IT-Systems, 2008. ,
Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems, Designing Privacy Enhancing Technologies, pp.10-29, 2001. ,
DOI : 10.1007/3-540-44702-4_2
Communication Theory of Secrecy Systems*, Bell System Technical Journal, vol.28, issue.4, pp.656-715, 1949. ,
DOI : 10.1002/j.1538-7305.1949.tb00928.x