L. A. Adamic and B. A. Huberman, Zipf's Law and the Internet, Glottometrics, vol.3, pp.143-150, 2002.

D. Agrawal, D. Kesdogan, and S. Penz, Probabilistic treatment of MIXes to hamper traffic analysis, Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405), p.16, 2003.
DOI : 10.1109/SECPRI.2003.1199324

O. Berthold, H. Federrath, and S. Köpsell, Web MIXes: A System for Anonymous and Unobservable Internet Access, Designing Privacy Enhancing Technologies, pp.115-129, 2001.
DOI : 10.1007/3-540-44702-4_7

O. Berthold and H. Langos, Dummy Traffic against Long Term Intersection Attacks, Privacy Enhancing Technologies, pp.110-128, 2003.
DOI : 10.1007/3-540-36467-6_9

R. K. Brayton, On the asymptotic behavior of the number of trials necessary to complete a set with random selection, Journal of Mathematical Analysis and Applications, vol.7, issue.1, pp.31-61, 1963.
DOI : 10.1016/0022-247X(63)90076-3

L. Breslau, P. Cao, L. Fan, G. Phillips, and S. Shenker, Web caching and Zipf-like distributions: evidence and implications, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320), pp.126-134, 1999.
DOI : 10.1109/INFCOM.1999.749260

D. L. Chaum, Untraceable electronic mail, return addresses, and digital pseudonyms, Communications of the ACM, vol.24, issue.2, pp.84-88, 1981.
DOI : 10.1145/358549.358563

G. Danezis, Statistical Disclosure Attacks, Proceedings of Security and Privacy in the Age of Uncertainty, pp.421-426, 2003.
DOI : 10.1007/978-0-387-35691-4_40

G. Danezis, Better Anonymous Communications, 2004.

G. Danezis, C. Diaz, and C. Troncoso, Two-Sided Statistical Disclosure Attack, Privacy Enhancing Technologies, pp.30-44, 2007.
DOI : 10.1007/978-3-540-75551-7_3

G. Danezis and A. Serjantov, Statistical Disclosure or Intersection Attacks on Anonymity Systems, Information Hiding, pp.293-308, 2005.
DOI : 10.1007/978-3-540-30114-1_21

G. Danezis and C. Troncoso, Vida: How to Use Bayesian Inference to De-anonymize Persistent Communications, Privacy Enhancing Technologies, pp.56-72, 2009.
DOI : 10.1007/978-3-642-03168-7_4

R. Dingledine, N. Mathewson, and P. Syverson, Tor: The Second-Generation Onion Router, Proceedings of the 13th USENIX Security Symposium, pp.303-320, 2004.

M. R. Garey and D. S. Johnson, Computers and Intractability: A Guide to the Theory of NP- Completeness, Freeman, 1990.

S. Glassman, A caching relay for the World Wide Web, Computer Networks and ISDN Systems, vol.27, issue.2, pp.165-173, 1994.
DOI : 10.1016/0169-7552(94)90130-9

D. Kesdogan, D. Agrawal, V. Pham, and D. Rauterbach, Fundamental limits on the anonymity provided by the MIX technique, 2006 IEEE Symposium on Security and Privacy (S&P'06), pp.86-99, 2006.
DOI : 10.1109/SP.2006.17

D. Kesdogan and L. Pimenidis, The Hitting Set Attack on Anonymity Protocols, Information Hiding, pp.326-339, 2004.
DOI : 10.1007/978-3-540-30114-1_23

D. Kesdogan and L. Pimenidis, The Lower Bound of Attacks on Anonymity Systems ??? A Unicity Distance Approach, Quality of Protection, Advances in Information Security, pp.145-158, 2006.
DOI : 10.1007/978-0-387-36584-8_12

S. Köpsell, Entwicklung und Betrieb eines Anonymisierungsdienstes für das WWW, 2010.

N. Mathewson and R. Dingledine, Practical Traffic Analysis: Extending and Resisting Statistical Disclosure, Privacy Enhancing Technologies, pp.17-34, 2005.
DOI : 10.1007/11423409_2

O. Connor and L. , Entropy Bounds for Traffic Confirmation Cryptology ePrint Archive, Report, vol.365, 2008.

F. Perez-gonzalez, C. Troncoso, and S. Oya, A Least Squares Approach to the Static Traffic Analysis of High-Latency Anonymous Communication Systems. Information Forensics and Security, IEEE Transactions on, vol.9, issue.9, pp.1341-1355, 2014.

F. Pérez-gonzález and C. Troncoso, Understanding Statistical Disclosure: A Least Squares Approach, Privacy Enhancing Technologies, pp.38-57, 2012.
DOI : 10.1007/978-3-642-31680-7_3

A. Pfitzmann and M. Hansen, Anonymity, Unobservability, Pseudonymity, and Identity Management ? A Proposal for Terminology, pp.0-34, 2010.

D. V. Pham, Towards Practical and Fundamental Limits of Anonymity Protection, 2013.

D. V. Pham and D. Kesdogan, A Combinatorial Approach for an Anonymity Metric, Information Security and Privacy, pp.26-43, 2009.
DOI : 10.1007/3-540-36415-3_4

D. V. Pham, J. Wright, and D. Kesdogan, A Practical Complexity-Theoretic Analysis of Mix Systems, Computer Security ESORICS 2011, pp.508-527, 2011.
DOI : 10.1007/978-3-642-23822-2_28

V. Pham, Analysis of the Anonymity Set of Chaumian Mixes, 13th Nordic Workshop on Secure IT-Systems, 2008.

J. F. Raymond, Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems, Designing Privacy Enhancing Technologies, pp.10-29, 2001.
DOI : 10.1007/3-540-44702-4_2

C. Shannon, Communication Theory of Secrecy Systems*, Bell System Technical Journal, vol.28, issue.4, pp.656-715, 1949.
DOI : 10.1002/j.1538-7305.1949.tb00928.x