L. Cottrell, Your IP Address is Your ID Available: http://www.anonymizer.com Proxify®anonymous proxy protects your online privacy, 2011.

D. L. Chaum, Untraceable electronic mail, return addresses, and digital pseudonyms, Communications of the ACM, vol.24, issue.2, pp.84-90, 1981.
DOI : 10.1145/358549.358563

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.128.8210

M. Reed, P. Syverson, and D. Goldschlag, Anonymous connections and onion routing Selected Areas in Communications, IEEE Journal on, vol.16, issue.4, pp.482-494, 1998.

C. A. Melchor and Y. Deswarte, From dc-nets to pmixes: Multiple variants for anonymous communications, Proceedings of the Fifth IEEE International Symposium on Network Computing and Applications, pp.163-172, 2006.

M. K. Reiter and A. D. Rubin, Crowds: anonymity for Web transactions, ACM Transactions on Information and System Security, vol.1, issue.1, pp.66-92, 1998.
DOI : 10.1145/290163.290168

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.36.864

H. Sui, J. Wang, J. Chen, and S. Chen, The cost of becoming anonymous: on the participant payload in Crowds, Information Processing Letters, vol.90, issue.2, pp.81-86, 2004.
DOI : 10.1016/j.ipl.2004.01.018

C. Díaz, S. Seys, J. Claessens, and B. Preneel, Towards Measuring Anonymity, Proceedings of the 2nd international conference on Privacy enhancing technologies, ser. PET'02, pp.54-68, 2003.
DOI : 10.1007/3-540-36467-6_5

V. Sassone, E. Elsalamouny, S. Hamadou, and R. W. Floyd, Trust in crowds: probabilistic behaviour in anonymity protocols Available: http://portal.acm.org/citation.cfm?id=1893701 Algorithm 97: Shortest path, Proceedings of the 5th international conference on Trustworthly global computing, ser. TGC'10, pp.88-102, 1962.