A. Acquisti, Privacy in electronic commerce and the economics of immediate gratification, Proceedings of the 5th ACM conference on Electronic commerce , EC '04, 2004.
DOI : 10.1145/988772.988777

M. Alsabah and I. Goldberg, PCTCP, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, pp.349-360, 2013.
DOI : 10.1145/2508859.2516715

O. Berthold, H. Federrath, and S. Köpsell, Web mixes: A system for anonymous and unobservable internet access Designing Privacy Enhancing Technologies, Lecture Notes in Computer Science, pp.115-129, 2001.
DOI : 10.1007/3-540-44702-4_7

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.25.5586

M. Casado and M. J. Freedman, Peering Through the Shroud: The Effect of Edge Opacity on IP-Based Client Identification, 4th Symposium on Networked Systems Design and Implementation, 2007.

C. Chen, D. E. Asoni, D. Barrera, G. Danezis, and A. Perrig, HORNET, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15, pp.1441-1454, 2015.
DOI : 10.1145/2810103.2813628

P. Eckersley, M. J. Atallah, and N. J. Hopper, How Unique Is Your Web Browser?, Privacy Enhancing Technologies, 10th International Symposium, PETS. Proceedings . Lecture Notes in Computer Science, pp.1-18, 2010.
DOI : 10.1007/978-3-642-14527-8_1

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.381.1264

B. Fabian, F. Goertz, S. Kunz, S. Müller, and M. Nitzsche, Privately Waiting ??? A Usability Analysis of the Tor Anonymity Network, 16th Americas Conference on Information Systems Association for Information Systems, pp.12-15, 2010.
DOI : 10.1007/978-3-642-15141-5_6

M. Graham and S. De-sabbata, Information Geographies at the Oxford Internet Institute The anonymous Internet, 2015.

A. Greenberg, Anonabox Recalls 350 Privacy " Routers for Security Flaws, 2015.

D. Herrmann, C. Arndt, and H. Federrath, IPv6 Prefix Alteration: An Opportunity to Improve Online Privacy In: 1st Workshop on Privacy and Data Protection Technology (PDPT 2012), co-located with Amsterdam Privacy Conference (APC 2012), Proceedings (2012), p.4704, 1211.

D. Herrmann, K. Fuchs, J. Lindemann, and H. Federrath, EncDNS: A Lightweight Privacy-Preserving Name Resolution Service, Computer Security ? ESORICS 2014 ? 19th European Symposium on Research in Computer Security, pp.37-55, 2014.
DOI : 10.1007/978-3-319-11203-9_3

D. Herrmann, M. Maaß, H. Federrath, N. Cuppens-boulahia, F. Cuppens et al., Evaluating the Security of a DNS Query Obfuscation Scheme for Private Web Surfing, ICT Systems Security and Privacy Protection ? 29th IFIP TC 11 International Conference Proceedings. IFIP Advances in Information and Communication Technology, pp.205-219, 2014.
DOI : 10.1007/978-3-642-55415-5_17

URL : https://hal.archives-ouvertes.fr/hal-01370367

D. C. Howe and H. Nissenbaum, TrackMeNot: Resisting surveillance in web search, Lessons from the Identity Trail: Anonymity, Privacy, and Identity in a Networked Society, pp.417-436, 2009.

H. C. Hsiao, T. J. Kim, A. Perrig, A. Yamada, S. C. Nelson et al., LAP: Lightweight Anonymity and Privacy, 2012 IEEE Symposium on Security and Privacy, pp.506-520, 2012.
DOI : 10.1109/SP.2012.37

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.678.1247

M. Karol, M. Hluchyj, and S. Morgan, Input Versus Output Queueing on a Space-Division Packet Switch, IEEE Transactions on Communications, vol.35, issue.12, pp.1347-1356, 1987.
DOI : 10.1109/TCOM.1987.1096719

T. Kohno, A. Broido, and K. C. Claffy, Remote Physical Device Fingerprinting, IEEE Transactions on Dependable and Secure Computing, vol.2, issue.2, pp.93-108, 2005.
DOI : 10.1109/TDSC.2005.26

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.134.7415

P. Manils, C. Abdelberi, S. L. Blond, M. A. Kâafar, C. Castelluccia et al., Compromising Tor anonymity exploiting P2P information leakage, p.1461, 2010.
URL : https://hal.archives-ouvertes.fr/inria-00471556

N. Mathewson, P. Syverson, and R. Dingledine, Tor: the second-generation onion router, the Proceedings of the 13th USENIX Security Symposium, 2004.

J. R. Mayer and J. C. Mitchell, Third-Party Web Tracking: Policy and Technology, 2012 IEEE Symposium on Security and Privacy, pp.21-23, 2012.
DOI : 10.1109/SP.2012.47

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.388.5781

K. Mowery and H. Shacham, Pixel perfect: Fingerprinting canvas in HTML5, Proceedings of Web 2.0 Security and Privacy, p.2012, 2012.

B. Raghavan, T. Kohno, A. Snoeren, and D. Wetherall, Enlisting ISPs to Improve Online Privacy: IP Address Mixing by Default, Privacy Enhancing Technologies, pp.143-163, 2009.
DOI : 10.1007/978-3-642-03168-7_9

J. Reardon and I. Goldberg, Improving Tor using a TCP-over-DTLS Tunnel, USENIX Security Symposium, pp.119-134, 2009.

F. Roesner, T. Kohno, and D. Wetherall, Detecting and defending against third-party tracking on the web, Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation. pp. 12?12. NSDI'12, USENIX Association, 2012.

J. Sankey and M. K. Wright, Dovetail: Stronger Anonymity in Next-Generation Internet Routing, Privacy Enhancing Technologies ? 14th International Symposium, PETS 2014, pp.283-303, 2014.
DOI : 10.1007/978-3-319-08506-7_15

URL : http://arxiv.org/abs/1405.0351

T. Ferreira, C. Jonker, H. Mauw, and S. , FP-Block: usable web privacy by controlling browser fingerprinting, Computer Security ? ESORICS 2015 ? 20th European Symposium on Research in Computer Security Proceedings, Part II, pp.3-19, 2015.

W. Tor-trac, Transparently Routing Traffic Through Tor (2015), https://trac. torproject.org/projects/tor

F. Tschorsch and B. Scheuermann, How (not) to build a transport layer for anonymity overlays, ACM SIGMETRICS Performance Evaluation Review, vol.40, issue.4, pp.101-106, 2013.
DOI : 10.1145/2479942.2479956

Y. Xie, F. Yu, K. Achan, E. Gillum, M. Goldszmidt et al., How dynamic are IP addresses? In: Conference on Applications, technologies, architectures, and protocols for computer communications, Proceedings. pp, pp.301-312, 2007.

F. Zhao, Y. Hori, and K. Sakurai, Analysis of Privacy Disclosure in DNS Query, 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE'07), pp.952-957, 2007.
DOI : 10.1109/MUE.2007.84