M. Alsabah and I. Goldberg, PCTCP, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, 2013.
DOI : 10.1145/2508859.2516715

M. Backes and A. Kate, AnoA: A Framework for Analyzing Anonymous Communication Protocols, 2013 IEEE 26th Computer Security Foundations Symposium, 2013.
DOI : 10.1109/CSF.2013.18

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

L. David and . Chaum, Untraceable electronic mail, return addresses, and digital pseudonyms, Communications of the ACM, vol.24, issue.2, 1981.

D. Chaum, Anonymization by high-performance scalable mixing, p.8, 2016.

C. Chen, HORNET, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15, 2015.
DOI : 10.1145/2810103.2813628

B. Chor, Private information retrieval, Journal of the ACM, vol.456, 1998.

G. Danezis, R. Dingledine, and N. Mathewson, Mixminion: design of a type III anonymous remailer protocol, Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405), 2003.
DOI : 10.1109/SECPRI.2003.1199323

G. Danezis and I. Goldberg, Sphinx: A Compact and Provably Secure Mix Format, 2009 30th IEEE Symposium on Security and Privacy, 2009.
DOI : 10.1109/SP.2009.15

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

S. Dibenedetto, ANDaNA : Anonymous Named Data Networking Application, 2011.

R. Dingledine, N. Mathewson, and P. Syverson, Tor: The Second-Generation Onion Router, 2004.

R. Dingledine and S. J. Murdoch, Performance Improvements on Tor or, Why Tor is slow and what we're going to do about it URL: https, 2009.

S. Farrell and H. Tschofenig, Pervasive Monitoring Is an Attack
DOI : 10.17487/rfc7258

H. Federrath, AN.ON ? Privacy protection on the Internet, In: ERCIM News, vol.49, p.11, 2002.

H. Federrath, Privacy-Preserving DNS: Analysis of Broadcast, Range Queries and Mix-Based Protection Methods, 2011.
DOI : 10.1007/978-3-642-23822-2_36

J. Geddes, R. Jansen, and N. Hopper, IMUX, Proceedings of the 13th Workshop on Privacy in the Electronic Society, WPES '14, 2014.
DOI : 10.1145/2665943.2665948

P. B. Godfrey, Pathlet routing, In: ACM SIGCOMM, 2009.
DOI : 10.1145/1592568.1592583

C. Gülcü and G. Tsudik, Mixing Email with Babel, 1996.

Y. He, On routing asymmetry in the Internet, IEEE GLOBECOM, 2005.

H. Hsu-chun, LAP: Lightweight anonymity and privacy, 2012.

A. Johnson, Users get routed, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, 2013.
DOI : 10.1145/2508859.2516651

. Jondonym, https://anonymous-proxy-servers

V. Liu, Tor instead of IP, Proceedings of the 10th ACM Workshop on Hot Topics in Networks, HotNets '11, 2011.
DOI : 10.1145/2070562.2070576

T. Minarik and A. Osula, Tor does not stink: Use and abuse of the Tor anonymity network from the perspective of law, Computer Law & Security Review, vol.32, issue.1, pp.111-127, 2016.
DOI : 10.1016/j.clsr.2015.12.002

P. Mittal, Scalable Anonymous Communication with Provable Security, 2010.

J. Pan, S. Paul, and R. Jain, A survey of the research on future internet architectures, IEEE Communications Magazine, vol.49, issue.7, pp.26-36, 2011.
DOI : 10.1109/MCOM.2011.5936152

J. Reardon and I. Goldberg, Improving Tor using a TCP-over-DTLS Tunnel, 2009.

J. Sankey and M. Wright, Dovetail: Stronger Anonymity in Next-Generation Internet Routing, In: PETS, 2014.
DOI : 10.1007/978-3-319-08506-7_15

K. Seo and S. Kent, Security Architecture for the Internet Protocol. IETF RFC 4301, 2005.

X. Yang, D. Clark, W. Arthur, and . Berger, NIRA: A New Inter-Domain Routing Architecture, IEEE/ACM Transactions on Networking, vol.15, issue.4, 2007.
DOI : 10.1109/TNET.2007.893888

B. Zantout and R. Haraty, I2P data communication system

L. Zhang, Named data networking, ACM SIGCOMM Computer Communication Review, vol.44, issue.3, 2014.
DOI : 10.1145/2656877.2656887

URL : https://hal.archives-ouvertes.fr/hal-01182997

X. Zhang, SCION: Scalability, Control, and Isolation on Next-Generation Networks, 2011 IEEE Symposium on Security and Privacy, 2011.
DOI : 10.1109/SP.2011.45

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=