A. Back, U. Möller, and A. Stiglic, Traac analysis aaacks and trade-oos in anonymity providing systems, Information Hiding, pp.245-257, 2001.
DOI : 10.1007/3-540-45496-9_18

D. Bogdanov, S. Laur, and J. Willemson, Sharemind: A Framework for Fast Privacy-Preserving Computations, Computer Security-ESORICS 2008, pp.192-206, 2008.
DOI : 10.1007/s001459910003

URL : http://www.math.ut.ee/%7Eswen/publications/articles/bogdanov-laur-willemson-2008.pdf

N. Borisov, G. Danezis, and I. Goldberg, Abstract, Proceedings on Privacy Enhancing Technologies 2015, pp.4-24, 2015.
DOI : 10.1109/TIT.1976.1055638

N. Borisov, I. Goldberg, and E. A. Brewer, OO-the-record communication , or, why not to use PGP, pp.77-84, 2004.
DOI : 10.1145/1029179.1029200

URL : http://hatswitch.org/~nikita/papers/otr-wpes.pdf

J. Camenisch and E. Van-herreweghen, anonymous credential system, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, pp.21-30, 2002.
DOI : 10.1145/586110.586114

G. Caronni, Walking the Web of trust, Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000), pp.153-158, 2000.
DOI : 10.1109/ENABL.2000.883720

M. Chase, S. Meiklejohn, and G. Zaverucha, Algebraic MACs and keyed-veriication anonymous credentials, Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, pp.1205-1216, 2014.
DOI : 10.1145/2660267.2660328

URL : https://eprint.iacr.org/2013/516.pdf

D. Clarke, J. Elien, C. Ellison, M. Fredeee, A. Morcos et al., Certificate chain discovery in SPKI/SDSI, Journal of Computer Security, vol.9, issue.4, pp.285-322, 2001.
DOI : 10.3233/JCS-2001-9402

I. Damgård, M. Keller, E. Larraia, V. Pastro, P. Scholl et al., Practical Covertly Secure MPC for Dishonest Majority ??? Or: Breaking the SPDZ Limits, Computer Security?ESORICS 2013, pp.1-18, 2013.
DOI : 10.1007/978-3-642-40203-6_1

G. Danezis, C. Diaz, C. Troncoso, and B. Laurie, $\text{Drac}$ : An Architecture for Anonymous Low-Volume Communications, Lecture Notes in Computer Science, vol.393, issue.2, pp.202-219, 2010.
DOI : 10.1038/30918

G. Danezis, B. Kulynych, C. Troncoso, and M. Isaakides, ClaimChains: A Decentralized Identity System based on hash chains, 2016.

G. Danezis and P. Miial, SybilInfer: Detecting Sybil Nodes using Social Networks, NDSS, 2009.

G. Danezis and A. Serjantov, Statistical Disclosure or Intersection AAacks on Anonymity Systems, 6th International Workshop on Information Hiding (Lecture Notes in Computer Science), pp.293-308, 2004.
DOI : 10.1007/978-3-540-30114-1_21

W. Diie, E. Martin, and . Hellman, New directions in cryptography. Information eory, IEEE Transactions on, vol.22, issue.6, pp.644-654, 1976.

R. Dingledine, N. Mathewson, and P. F. Syverson, Tor: e Second- Generation Onion Router, Proceedings of the 13th USENIX Security Symposium, pp.303-320, 2004.
DOI : 10.21236/ADA465464

URL : http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA465464&Location=U2&doc=GetTRDoc.pdf

R. John and . Douceur, e Sybil AAack, IPTPS (Lecture Notes in Computer Science), pp.251-260, 2002.

C. Dwork, Diierential privacy: A survey of results. In eory and applications of models of computation, pp.1-19, 2008.

T. Elahi, G. Danezis, and I. Goldberg, PrivEx, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, pp.1068-1079, 2014.
DOI : 10.1007/978-3-642-03356-8_8

M. Isaakidis, H. Halpin, and G. Danezis, UnlimitID, Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, WPES'16, pp.139-142, 2016.
DOI : 10.1145/2857705.2857725

URL : https://hal.archives-ouvertes.fr/hal-01426847

L. Lamport, Time, clocks, and the ordering of events in a distributed system, Communications of the ACM, vol.21, issue.7, 1978.
DOI : 10.1145/359545.359563

M. S. Melara, A. Blankstein, J. Bonneau, E. W. Felten, and M. J. Freedman, CONIKS: Bringing Key Transparency to End Users USENIX Association, 24th USENIX Security Symposium, USENIX Security 15, pp.383-398, 2015.

W. Mostowski and P. Vullers, EEcient U-Prove implementation for anonymous credentials on smart cards, Security and Privacy in Communication Networks, pp.243-260, 2011.
DOI : 10.1007/978-3-642-31909-9_14

URL : http://www.cs.ru.nl/%7Epim/publications/2011_securecomm.pdf

A. Narayanan, V. Toubiana, S. Barocas, H. Nissenbaum, and D. Boneh, A Critical Look at Decentralized Personal Data Architectures, p.4503, 2012.

F. Olumoon and I. Goldberg, Privacy-preserving queries over relational databases, Privacy enhancing technologies, pp.75-92, 2010.

A. Pptzmann and M. Köhntopp, Anonymity, unobservability, and pseudeonymity -a proposal for terminology. International workshop on Designing privacy enhancing technologies: design issues in anonymity and unobservability table of contents, pp.1-9, 2001.

B. Pinkas and T. Reinman, Oblivious RAM Revisited, Advances in Cryptology?CRYPTO 2010, pp.502-519, 2010.
DOI : 10.1007/978-3-642-14623-7_27

URL : http://eprint.iacr.org/2010/366.pdf

B. Ramsdell, Secure/multipurpose internet mail extensions (S/MIME) version 3.1 message speciication, 2004.

L. Ronald, B. Rivest, and . Lampson, SDSI-A Simple Distributed Security Infrastructure. CRYPTO, 1996.

L. Sassaman, B. Cohen, and N. Mathewson, The pynchon gate, Proceedings of the 2005 ACM workshop on Privacy in the electronic society , WPES '05, pp.1-9, 2005.
DOI : 10.1145/1102199.1102201

A. Serjantov and G. Danezis, Towards an Information eoretic Metric for Anonymity, Designing Privacy Enhancing Technologies, Proceedings of PET'02, pp.41-53, 2002.
DOI : 10.1007/3-540-36467-6_4

URL : http://www.cl.cam.ac.uk/users/aas23/papers_aas/set.ps

E. Sparrow, H. Halpin, K. Kaneko, and R. Pollan, LEAP: A Next-Generation Client VPN and Encrypted Email Provider, International Conference on Cryptology and Network Security, pp.176-191, 2016.
DOI : 10.1109/SP.2015.22

URL : https://hal.archives-ouvertes.fr/hal-01426850

C. Troncoso, G. Danezis, M. Isaakidis, and H. Halpin, Abstract, Proceedings on Privacy Enhancing Technologies, vol.57, issue.4, 2017.
DOI : 10.1515/popets-2017-0056

A. Whiien and J. Tygar, Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0, Usenix Security, 1999.

K. Wst and A. Gervais, Do you need a Blockchain? Cryptology ePrint Archive, 2017.

H. Yu, B. Phillip, M. Gibbons, F. Kaminsky, and . Xiao, Sybillimit: A near-optimal social network defense against sybil aaacks, Security and Privacy, pp.3-17, 2008.
DOI : 10.1109/sp.2008.13

URL : http://www.comp.nus.edu.sg/~yuhf/yuh-sybillimit.pdf

H. Yu, M. Kaminsky, B. Phillip, A. Gibbons, and . Flaxman, SybilGuard, ACM SIGCOMM Computer Communication Review, vol.36, issue.4, pp.267-278, 2006.
DOI : 10.1145/1151659.1159945

P. Zimmermann, Preey good privacy: public key encryption for the masses, Building in big brother, pp.93-107, 1995.