Privacy in electronic commerce and the economics of immediate gratification, Proceedings of the 5th ACM conference on Electronic commerce , EC '04, 2004. ,
DOI : 10.1145/988772.988777
PCTCP, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, pp.349-360, 2013. ,
DOI : 10.1145/2508859.2516715
Web mixes: A system for anonymous and unobservable internet access Designing Privacy Enhancing Technologies, Lecture Notes in Computer Science, pp.115-129, 2001. ,
DOI : 10.1007/3-540-44702-4_7
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.25.5586
Peering Through the Shroud: The Effect of Edge Opacity on IP-Based Client Identification, 4th Symposium on Networked Systems Design and Implementation, 2007. ,
HORNET, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15, pp.1441-1454, 2015. ,
DOI : 10.1145/2810103.2813628
How Unique Is Your Web Browser?, Privacy Enhancing Technologies, 10th International Symposium, PETS. Proceedings . Lecture Notes in Computer Science, pp.1-18, 2010. ,
DOI : 10.1007/978-3-642-14527-8_1
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.381.1264
Privately Waiting ??? A Usability Analysis of the Tor Anonymity Network, 16th Americas Conference on Information Systems Association for Information Systems, pp.12-15, 2010. ,
DOI : 10.1007/978-3-642-15141-5_6
Information Geographies at the Oxford Internet Institute The anonymous Internet, 2015. ,
Anonabox Recalls 350 Privacy " Routers for Security Flaws, 2015. ,
IPv6 Prefix Alteration: An Opportunity to Improve Online Privacy In: 1st Workshop on Privacy and Data Protection Technology (PDPT 2012), co-located with Amsterdam Privacy Conference (APC 2012), Proceedings (2012), p.4704, 1211. ,
EncDNS: A Lightweight Privacy-Preserving Name Resolution Service, Computer Security ? ESORICS 2014 ? 19th European Symposium on Research in Computer Security, pp.37-55, 2014. ,
DOI : 10.1007/978-3-319-11203-9_3
Evaluating the Security of a DNS Query Obfuscation Scheme for Private Web Surfing, ICT Systems Security and Privacy Protection ? 29th IFIP TC 11 International Conference Proceedings. IFIP Advances in Information and Communication Technology, pp.205-219, 2014. ,
DOI : 10.1007/978-3-642-55415-5_17
URL : https://hal.archives-ouvertes.fr/hal-01370367
TrackMeNot: Resisting surveillance in web search, Lessons from the Identity Trail: Anonymity, Privacy, and Identity in a Networked Society, pp.417-436, 2009. ,
LAP: Lightweight Anonymity and Privacy, 2012 IEEE Symposium on Security and Privacy, pp.506-520, 2012. ,
DOI : 10.1109/SP.2012.37
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.678.1247
Input Versus Output Queueing on a Space-Division Packet Switch, IEEE Transactions on Communications, vol.35, issue.12, pp.1347-1356, 1987. ,
DOI : 10.1109/TCOM.1987.1096719
Remote Physical Device Fingerprinting, IEEE Transactions on Dependable and Secure Computing, vol.2, issue.2, pp.93-108, 2005. ,
DOI : 10.1109/TDSC.2005.26
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.134.7415
Compromising Tor anonymity exploiting P2P information leakage, p.1461, 2010. ,
URL : https://hal.archives-ouvertes.fr/inria-00471556
Tor: the second-generation onion router, the Proceedings of the 13th USENIX Security Symposium, 2004. ,
Third-Party Web Tracking: Policy and Technology, 2012 IEEE Symposium on Security and Privacy, pp.21-23, 2012. ,
DOI : 10.1109/SP.2012.47
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.388.5781
Pixel perfect: Fingerprinting canvas in HTML5, Proceedings of Web 2.0 Security and Privacy, p.2012, 2012. ,
Enlisting ISPs to Improve Online Privacy: IP Address Mixing by Default, Privacy Enhancing Technologies, pp.143-163, 2009. ,
DOI : 10.1007/978-3-642-03168-7_9
Improving Tor using a TCP-over-DTLS Tunnel, USENIX Security Symposium, pp.119-134, 2009. ,
Detecting and defending against third-party tracking on the web, Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation. pp. 12?12. NSDI'12, USENIX Association, 2012. ,
Dovetail: Stronger Anonymity in Next-Generation Internet Routing, Privacy Enhancing Technologies ? 14th International Symposium, PETS 2014, pp.283-303, 2014. ,
DOI : 10.1007/978-3-319-08506-7_15
URL : http://arxiv.org/abs/1405.0351
FP-Block: usable web privacy by controlling browser fingerprinting, Computer Security ? ESORICS 2015 ? 20th European Symposium on Research in Computer Security Proceedings, Part II, pp.3-19, 2015. ,
Transparently Routing Traffic Through Tor (2015), https://trac. torproject.org/projects/tor ,
How (not) to build a transport layer for anonymity overlays, ACM SIGMETRICS Performance Evaluation Review, vol.40, issue.4, pp.101-106, 2013. ,
DOI : 10.1145/2479942.2479956
How dynamic are IP addresses? In: Conference on Applications, technologies, architectures, and protocols for computer communications, Proceedings. pp, pp.301-312, 2007. ,
Analysis of Privacy Disclosure in DNS Query, 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE'07), pp.952-957, 2007. ,
DOI : 10.1109/MUE.2007.84