M. Bonetti, Breaking tor sessions with html5 DeepSec http://sid77.slackware.it/ tor, BreakingTor.pdf, 2009.

D. Chaum, Untraceable electronic mail, return addresses, and digital pseudo-nyms, Communications of the ACM, 1981.

A. Christensen, Practical onion hacking: finding the real address of tor clients. FortConsults advisory http, 2009.

R. Dingledine, N. Mathewson, and P. Syverson, Tor: The second-generation onion router, USENIX Security Symposium, 2004.

G. Fleischer, Attacking tor at the application layer. DEFCON http://www.defcon.org/images/ defcon-17/dc-17-presentations/ defcon-17-gregory_ fleischer-attacking_tor.pdf, 2009.

D. M. Goldschlag, M. G. Reed, and P. F. Syverson, Hiding Routing information, Information Hiding First International Workshop, pp.137-150, 1996.
DOI : 10.1007/3-540-61996-8_37

G. Hazel and A. Norberg, Extension for peers to send metadata files (bep 9)

R. Kosala and H. Blockeel, Web mining research, SIGKDD Explorations, pp.1-15, 2000.
DOI : 10.1145/360402.360406

A. Stevens-le-blond, F. L. Legout, W. Fessant, M. A. Dabbous, and . Kaafar, Spying the World from your Laptop ? Identifying and Profiling Content Providers and Big Downloaders in BitTorrent, 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET'10), 2010.

K. Loesing, S. Murdoch, and R. Dingledine, A Case Study on Measuring Statistical Data in the Tor Anonymity Network, Financial Cryptography and Data Security '10, 2010.
DOI : 10.1007/978-3-642-14992-4_19

A. Loewenstern, Bittorrent extension protocol (bep 5)

P. Maymounkov and D. Mazires, Kademlia: A Peer-to-Peer Information System Based on the XOR Metric, IPTPS, pp.53-65, 2002.
DOI : 10.1007/3-540-45748-8_5

D. Mccoy, K. Bauer, D. Grunwald, T. Kohno, and D. Sicker, Shining Light in Dark Places: Understanding the Tor Network, Privacy Enhancing Technologies Symposium 2008 (PETS), 2008.
DOI : 10.1007/978-3-540-70630-4_5

. Metasploit, Decloaking engine, 2009.

A. Norberg, L. Strigeus, and G. Hazel, Bittorrent extension protocol (bep 10)

M. Perry and S. Squires, privoxy, free software foundation, 2010.

M. Perry and S. Squires, Tor button. https: //www.torproject.org/torbutton, 2010.

M. G. Reed, P. F. Syverson, and D. M. Goldschlag, Anonymous connections and onion routing, IEEE Journal on Selected Areas in Communications, vol.16, issue.4, pp.482-494, 1998.
DOI : 10.1109/49.668972

K. Sugiyama, K. Hatano, and M. Yoshikawa, Adaptive web search based on user profile constructed without any effort from users, Proceedings of the 13th conference on World Wide Web , WWW '04, pp.675-684, 2004.
DOI : 10.1145/988672.988764

P. Syverson, M. Reed, and D. Goldschlag, Onion routing access configurations, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00, 2000.
DOI : 10.1109/DISCEX.2000.824941

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=