, AOL Search Log Special, 2007.

, AOL Search Data Shows Users Planning to commit Murder, 2007.

R. Dingledine, N. Mathewson, and P. Syverson, Tor: the second-generation onion router, DTIC Document, Tech. Rep, 2004.

H. Corrigan-gibbs and B. Ford, Dissent: accountable anonymous group messaging, CCS, pp.340-350, 2010.

S. Ben-mokhtar, G. Berthou, A. Diarra, V. Quéma, and A. Shoker, Rac: a freerider-resilient, scalable, anonymous communication protocol, ICDCS, pp.520-529, 2013.
URL : https://hal.archives-ouvertes.fr/hal-00945795

S. T. Peddinti and N. Saxena, Web search query privacy: evaluating query obfuscation and anonymizing networks, Journal of Computer Security, vol.22, issue.1, pp.155-199, 2014.

A. Petit, T. Cerqueus, A. Boutet, S. B. Mokhtar, D. Coquil et al., Simattack: Private web search under fire, Journal of Internet Services and Applications, vol.7, issue.1, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01304320

D. C. Howe and H. Nissenbaum, Trackmenot: resisting surveillance in web search, Lessons from the Identity Trail: Anonymity, Privacy, and Identity in a Networked Society, vol.23, pp.417-436, 2009.

J. Domingo-ferrer, A. Solanas, and J. Castelì-a-roca, H(k)private information retrieval from privacy-uncooperative queryable databases, Online Information Review, vol.33, issue.4, pp.720-744, 2009.

A. Petit, T. Cerqueus, S. B. Mokhtar, L. Brunie, and H. Kosch, Peas: Private, efficient and accurate web search, Trustcom, vol.1, pp.571-580, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01159179

S. Ben-mokhtar, A. Boutet, P. Felber, M. Pasin, R. Pires et al., X-search: revisiting private web search using intel sgx, pp.198-208, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01588883

G. Pass, A. Chowdhury, and C. Torgeson, A picture of search, 2006.

C. Gentry, Fully homomorphic encryption using ideal lattices, Proceedings of the Forty-first Annual ACM Symposium on Theory of Computing, ser. STOC '09, pp.169-178, 2009.

W. Du and M. J. Atallah, Secure multi-party computation problems and their applications: A review and open problems, Proceedings of the 2001 workshop on New security paradigms, pp.13-22, 2001.

H. Pang, X. Ding, and X. Xiao, Embellishing text search queries to protect user privacy, Proc. VLDB Endow, vol.3, issue.1-2, pp.598-607, 2010.

D. Goldschlag, M. Reed, and P. Syverson, Onion routing, Communications of the ACM, vol.42, issue.2, pp.39-41, 1999.

D. I. Wolinsky, H. Corrigan-gibbs, B. Ford, and A. Johnson, Dissent in numbers: making strong anonymity scale, OSDI, pp.179-182, 2012.

S. Gueron, A memory encryption engine suitable for general purpose processors, IACR Cryptology ePrint Archive, vol.2016, pp.197-204, 2016.

S. Brenner, C. Wulf, D. Goltzsche, N. Weichbrodt, M. Lorenz et al., Securekeeper: confidential zookeeper using intel sgx, Middleware, vol.14, p.13, 2016.

S. Arnautov, B. Trach, F. Gregor, T. Knauth, A. Martin et al., Scone: secure linux containers with intel sgx, pp.689-703, 2016.

F. Mckeen, I. Alexandrovich, I. Anati, D. Caspi, S. Johnson et al., Intel R software guard extensions (intel R sgx) support for dynamic memory management inside an enclave, HASP, vol.10, p.9, 2016.

. Intel-corp, , 2016.

D. Goltzsche, C. Wulf, D. Muthukumaran, K. Rieck, P. Pietzuch et al., Trustjs: trusted client-side execution of javascript, EuroSec, vol.7, pp.1-7, 2017.

, Press Release 8th Generation Intel Core, 2017.

N. Weichbrodt, A. Kurmus, P. Pietzuch, and R. Kapitza, Asyncshock: exploiting synchronisation bugs in intel sgx enclaves, ESORICS, pp.440-457, 2016.

Y. Xu, W. Cui, and M. Peinado, Controlled-channel attacks: deterministic side channels for untrusted operating systems, S&P, pp.640-656, 2015.
DOI : 10.1109/sp.2015.45

M. Shih, S. Lee, T. Kim, and M. Peinado, T-sgx: eradicating controlled-channel attacks against enclave programs, NDSS, 2017.
DOI : 10.14722/ndss.2017.23193

Y. Fu, E. Bauman, R. Quinonez, and Z. Lin, Sgx-lapd: thwarting controlled side channel attacks via enclave verifiable page faults, pp.357-380, 2017.
DOI : 10.1007/978-3-319-66332-6_16

S. Weiser and M. Werner, Sgxio: generic trusted i/o path for intel sgx, pp.261-268, 2017.

M. Pease, R. Shostak, and L. Lamport, Reaching agreement in the presence of faults, Journal of the ACM, vol.27, issue.2, pp.228-234, 1980.

L. Lamport, R. Shostak, and M. Pease, The byzantine generals problem, ACM Transactions on Programming Languages and Systems, vol.4, issue.3, pp.382-401, 1982.
DOI : 10.1145/357172.357176

URL : http://www.cs.wisc.edu/~bart/739/papers/byzantine.pdf

, Google Privacy & Terms, 2017.

D. M. Blei, A. Y. Ng, and M. I. Jordan, Latent dirichlet allocation, Journal of Machine Learning Research, vol.3, pp.993-1022, 2003.

G. Trends, , 2017.

M. Jelasity, S. Voulgaris, R. Guerraoui, A. Kermarrec, and M. Van-steen, Gossip-based peer sampling, ACM Transactions Computing System, vol.25, issue.3, 2007.

C. Fellbaum and E. , WordNet: an electronic lexical database, 1998.

A. K. Mccallum, Mallet: A machine learning for language toolkit

A. Mazieres, M. Trachman, J. Cointet, B. Coulmont, and C. Prieur, Deep tags: toward a quantitative analysis of online pornography, Porn Studies, vol.1, issue.1, pp.80-95, 2014.
URL : https://hal.archives-ouvertes.fr/hal-00937745

A. Gervais, R. Shokri, A. Singla, S. Capkun, and V. Lenders, Quantifying web-search privacy, CCS, pp.966-977, 2014.

. Crowdflower, , 2017.

, How mobile latency impacts publisher revenue, 2017.

, Knowledge Graph Search API, 2017.