M. Afanasyev, T. Kohno, J. Ma, N. Murphy, S. Savage et al., Privacy-preserving network forensics, Communications of the ACM, vol.54, issue.5, 2011.
DOI : 10.1145/1941487.1941508

D. Chaum and E. Van-heyst, Group Signatures, Proceedings of the 10th Annual International Conference EUROCRYPT'91
DOI : 10.1007/3-540-46416-6_22

R. Clayton, Mobile internet access data retention (not!) http://www.lightbluetouchpaper.org, 2010.

A. Haeberlen, R. Rodrigues, K. Gummadi, and P. Druschel, Pretty good packet authentication, Proceedings of the Fourth Workshop HotDep'08

I. News, Techie jailed due to Airtel mistake, p.25440, 2012.

D. Kravets, Twitter reluctantly coughs up occupy protesters data, 2012.

N. Provos and D. Mazì-eres, A future-adaptive password scheme, ATEC, 1999.