PCTCP, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, 2013. ,
DOI : 10.1145/2508859.2516715
AnoA: A Framework for Analyzing Anonymous Communication Protocols, 2013 IEEE 26th Computer Security Foundations Symposium, 2013. ,
DOI : 10.1109/CSF.2013.18
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.646.6178
Untraceable electronic mail, return addresses, and digital pseudonyms, Communications of the ACM, vol.24, issue.2, 1981. ,
Anonymization by high-performance scalable mixing, p.8, 2016. ,
HORNET, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15, 2015. ,
DOI : 10.1145/2810103.2813628
Private information retrieval, Journal of the ACM, vol.456, 1998. ,
Mixminion: design of a type III anonymous remailer protocol, Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405), 2003. ,
DOI : 10.1109/SECPRI.2003.1199323
Sphinx: A Compact and Provably Secure Mix Format, 2009 30th IEEE Symposium on Security and Privacy, 2009. ,
DOI : 10.1109/SP.2009.15
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1031.7608
ANDaNA : Anonymous Named Data Networking Application, 2011. ,
Tor: The Second-Generation Onion Router, 2004. ,
Performance Improvements on Tor or, Why Tor is slow and what we're going to do about it URL: https, 2009. ,
Pervasive Monitoring Is an Attack ,
DOI : 10.17487/rfc7258
AN.ON ? Privacy protection on the Internet, In: ERCIM News, vol.49, p.11, 2002. ,
Privacy-Preserving DNS: Analysis of Broadcast, Range Queries and Mix-Based Protection Methods, 2011. ,
DOI : 10.1007/978-3-642-23822-2_36
IMUX, Proceedings of the 13th Workshop on Privacy in the Electronic Society, WPES '14, 2014. ,
DOI : 10.1145/2665943.2665948
Pathlet routing, In: ACM SIGCOMM, 2009. ,
DOI : 10.1145/1592568.1592583
Mixing Email with Babel, 1996. ,
On routing asymmetry in the Internet, IEEE GLOBECOM, 2005. ,
LAP: Lightweight anonymity and privacy, 2012. ,
Users get routed, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, 2013. ,
DOI : 10.1145/2508859.2516651
https://anonymous-proxy-servers ,
Tor instead of IP, Proceedings of the 10th ACM Workshop on Hot Topics in Networks, HotNets '11, 2011. ,
DOI : 10.1145/2070562.2070576
Tor does not stink: Use and abuse of the Tor anonymity network from the perspective of law, Computer Law & Security Review, vol.32, issue.1, pp.111-127, 2016. ,
DOI : 10.1016/j.clsr.2015.12.002
Scalable Anonymous Communication with Provable Security, 2010. ,
A survey of the research on future internet architectures, IEEE Communications Magazine, vol.49, issue.7, pp.26-36, 2011. ,
DOI : 10.1109/MCOM.2011.5936152
Improving Tor using a TCP-over-DTLS Tunnel, 2009. ,
Dovetail: Stronger Anonymity in Next-Generation Internet Routing, In: PETS, 2014. ,
DOI : 10.1007/978-3-319-08506-7_15
Security Architecture for the Internet Protocol. IETF RFC 4301, 2005. ,
NIRA: A New Inter-Domain Routing Architecture, IEEE/ACM Transactions on Networking, vol.15, issue.4, 2007. ,
DOI : 10.1109/TNET.2007.893888
I2P data communication system ,
Named data networking, ACM SIGCOMM Computer Communication Review, vol.44, issue.3, 2014. ,
DOI : 10.1145/2656877.2656887
URL : https://hal.archives-ouvertes.fr/hal-01182997
SCION: Scalability, Control, and Isolation on Next-Generation Networks, 2011 IEEE Symposium on Security and Privacy, 2011. ,
DOI : 10.1109/SP.2011.45
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.206.2107