, Cisco Visual Networking Index: Forecast and Trends, pp.2017-2022

A. Bakker and M. Steen, PuppetCast: A Secure Peer Sampling Protocol, 2008 European Conference on Computer Network Defense. 3-10, 2008.

A. Barton, M. Imani, J. Ming, and M. Wright, Towards Predicting E cient and Anonymous Tor Circuits, 2018.

E. Bortnikov, M. Gurevich, I. Keidar, G. Kliot, and A. Shraer, Brahms: Byzantine Resilient Random Membership Sampling, Computer Networks, vol.53, pp.2340-2359, 2009.

Y. Bromberg, A. Luxey, and F. Taïani, CASCADE: Reliable Distributed Session Hando for Continuous Interaction Across Devices, IEEE 38th International Conference on Distributed Computing Systems (ICDCS), pp.244-254, 2018.

C. Cadwalladr, I Made Steve Bannon's Psychological Warfare Tool': Meet the Data War Whistleblower. The Guardian, 2018.

X. Cai, X. Cheng-zhang, B. Joshi, and R. Johnson, Touching from a Distance: Website Fingerprinting Attacks and Defenses, Proceedings of the 2012 ACM Conference on Computer and Communications Security -CCS '12, p.605, 2012.

D. L. Chaum, Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms, Commun. ACM, vol.24, pp.84-90, 1981.

C. Chen, D. E. Asoni, D. Barrera, G. Danezis, and A. Perrig, HORNET: High-Speed Onion Routing at the Network Layer, 2015.

I. Clarke, O. Sandberg, B. Wiley, and T. W. Hong, Freenet: A Distributed Anonymous Information Storage and Retrieval System, International Workshop on Designing Privacy Enhancing Technologies: Design Issues in Anonymity and Unobservability, pp.46-66, 2001.

B. Cohen, The BitTorrent Protocol Speci cation, 2008.

G. Danezis and I. Goldberg, Sphinx: A Compact and Provably Secure Mix Format, 30th IEEE Symposium on Security and Privacy, pp.269-282, 2009.

R. Dingledine, N. Mathewson, and P. Syverson, Tor: The Second-Generation Onion Router, 2004.

A. Fiat and M. Naor, Broadcast Encryption, Advances in Cryptology -CRYPTO' 93, pp.480-491, 1993.

J. Michael, R. Freedman, and . Morris, Tarzan: A Peer-to-peer Anonymizing Network Layer, Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS '02), 2002.

D. M. Goldschlag, M. G. Reed, and P. F. Syverson, Hiding Routing Information, Information Hiding, Gerhard Goos, Juris Hartmanis, vol.1174, 1996.

H. Springer-berlin, , pp.137-150

J. Stisa and G. , We Kill People Based on Metadata, pp.53-66, 2017.

C. Grotho, The GNUnet System, 2017.

H. Halpin, NEXTLEAP: Decentralizing Identity with Privacy for Secure Messaging, Proceedings of the 12th International Conference on Availability, Reliability and Security -ARES '17, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01673292

D. Harnik, B. Pinkas, and A. Shulman-peleg, Side Channels in Cloud Services: Deduplication in Cloud Storage, IEEE Security & Privacy, vol.8, pp.40-47, 2010.

P. Higgins, The Troubling Truth of Why It's Still So Hard to Share Files Directly, Wired, 2014.

H. Nguyen-phong, An Empirical Study of the I2P Anonymity Network and Its Censorship Resistance, Proceedings of the Internet Measurement Conference 2018 on -IMC '18, pp.379-392, 2018.

M. Jelasity, S. Voulgaris, R. Guerraoui, A. Kermarrec, and M. Van-steen, Gossip-based peer sampling, ACM ToCS, vol.25, 2007.

G. P. Jesi, A. Montresor, and M. Van-steen, Secure Peer Sampling, Computer Networks, vol.54, pp.2086-2098, 2010.

A. Johnson, C. Wacek, R. Jansen, M. Sherr, and P. Syverson, Users Get Routed: Tra c Correlation on Tor by Realistic Adversaries, Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security -CCS '13, pp.337-348, 2013.

S. Kim, J. Han, J. Ha, T. Kim, and D. Han, SGX-Tor: A Secure and Practical Tor Anonymity Network With SGX Enclaves, IEEE/ACM Transactions on Networking, vol.26, pp.2174-2187, 2018.

M. Kosinski, D. Stillwell, and T. Graepel, Private Traits and Attributes Are Predictable from Digital Records of Human Behavior, Proceedings of the National Academy of Sciences, vol.110, pp.5802-5805, 2013.

D. Stevens-le-blond, W. Cho-nes, P. Zhou, H. Druschel, P. Ballani et al., Towards E cient Tra c-Analysis Resistant Anonymity Networks, Proceedings of the ACM SIGCOMM 2013 Conference on SIGCOMM -SIGCOMM '13, pp.303-314, 2013.

J. A. Lockitt, A. G. Gat, and T. R. Dobyns, A Selective Repeat ARQ System, 3rd International Conference on Digital Satellite Communications, pp.189-195, 1975.

A. Luxey, Y. Bromberg, F. M. Costa, V. Lima, R. C. Da-rocha et al., Sprinkler: A Probabilistic Dissemination Protocol to Provide Fluid User Interaction in Multi-Device Ecosystems, 2018 IEEE International Conference on Pervasive Computing and Communications (PerCom). 1-10, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01704172

E. Macaskill, G. Dance, F. Cage, G. Chen, and N. Popovich, NSA Files Decoded: Edward Snowden's Surveillance Revelations Explained. The Guardian, 2013.

S. C. Matz, M. Kosinski, G. Nave, and D. J. Stillwell, Psychological Targeting as an E ective Approach to Digital Mass Persuasion, Proceedings of the National Academy of Sciences, vol.114, pp.12714-12719, 2017.

R. Munroe, File Transfer, 2011.

E. Nakashima and J. Warrick, For NSA Chief, Terrorist Threat Drives Passion to 'Collect It All, Washington Post, 2013.

A. Nambiar and M. Wright, Salsa: A Structured Approach to Large-scale Anonymity, Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS '06, pp.17-26, 2006.

M. Nasr, A. Houmansadr, and A. Mazumdar, Compressive Tra c Analysis: A New Paradigm for Scalable Tra c Analysis, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security -CCS '17, pp.2053-2069, 2017.

J. Naughton, Death by drone strike, dished out by algorithm. The Guardian, 2016.

, Contributions to the Mathematical Theory of Evolution.-II. Skew Variation in Homogeneous Material, Philosophical Transactions of the Royal Society of London. (A.), vol.186, pp.343-414, 1895.

L. Larry, B. S. Peterson, and . Davie, Computer Networks: A Systems Approach, pp.97-110, 2003.

A. M. Piotrowska, J. Hayes, T. Elahi, S. Meiser, and G. Danezis, The Loopix Anonymity System, 26th USENIX Security Symposium (USENIX Security 17, pp.1199-1216, 2017.

J. P. Podolanko, R. Pobala, H. Mucklai, G. Danezis, and M. Wright, LiLAC: Lightweight Low-Latency Anonymous Chat, pp.141-151, 2017.

R. Lawrence, B. Rabiner, and J. Hwang, An Introduction to Hidden Markov Models, IEEE ASSP Magazine, vol.3, pp.4-16, 1986.

M. Rennhard and B. Plattner, Introducing MorphMix: Peer-to-peer Based Anonymous Internet Usage with Collusion Detection, Proceedings of the 2002 ACM Workshop on Privacy in the Electronic Society (WPES '02), 2002.

F. Rochet and O. Pereira, Water lling: Balancing the Tor Network with Maximum Diversity, Proceedings on Privacy Enhancing Technologies 2017, vol.2, pp.4-22, 2017.

F. Rochet and O. Pereira, Dropping on the Edge: Flexibility and Tra c Con rmation in Onion Routing Protocols, Proceedings on Privacy Enhancing, pp.27-46, 2018.

J. Stuart, P. Russell, and . Norvig, Arti cial Intelligence, A Modern Approach, vol.835, 2003.

A. Serjantov and P. Sewell, Passive Attack Analysis for Connection-Based Anonymity Systems, Computer Security -ESORICS 2003, pp.116-131, 2003.

. Douglas-r-stinson, Cryptography: theory and practice, 2005.

Y. Sun, A. Edmundson, N. Feamster, M. Chiang, and P. Mittal, Counter-RAPTOR: Safeguarding Tor Against Active Routing Attacks, 2017 IEEE Symposium on Security and Privacy (SP). 977-992, 2017.

J. Van-den, D. Hoo, M. Lazar, N. Zaharia, and . Zeldovich, Vuvuzela: Scalable Private Messaging Resistant to Tra c Analysis, Proceedings of the 25th Symposium on Operating Systems Principles -SOSP '15, pp.137-152, 2015.

S. Voulgaris, D. Gavidia, and M. Van-steen, CY-CLON: Inexpensive Membership Management for Unstructured P2P Overlays, vol.13, pp.197-217

G. Wan, A. Johnson, R. Wails, S. Wagh, and P. Mittal, Guard Placement Attacks on Path Selection Algorithms for Tor, Proceedings on Privacy Enhancing Technologies, vol.4, pp.272-291, 2019.

E. Weldon, An Improved Selective-Repeat ARQ Strategy, IEEE Transactions on Communications, vol.30, issue.3, pp.480-486, 1982.

W. Youyou, M. Kosinski, and D. Stillwell, Computer-Based Personality Judgments Are More Accurate than Those Made by Humans, Proceedings of the National Academy of Sciences, vol.112, issue.4, pp.1036-1040, 2015.