K. Bauer, D. Mccoy, D. Grunwald, T. Kohno, and D. Sicker, Low-resource routing attacks against anonymous systems, Proceedings of the 2007 Workshop on Privacy in the Electronic Society (WPES). Citeseer, 2007.
DOI : 10.1145/1314333.1314336

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.140.9042

D. Chaum, C. Of-the-acm, R. Rivest, and D. L. Chaum, Untraceable electronic mail, return addresses, and digital pseudonyms, Communications of the ACM, vol.24, issue.2, pp.84-88, 1981.
DOI : 10.1145/358549.358563

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.128.8210

A. Crenshaw, Darknets and hidden servers: Identifying the true ip/network identity of i2p service hosts, 2011.

D. Goldschlag, M. Reed, and P. Syverson, Hiding Routing information, Information Hiding, pp.137-150, 1996.
DOI : 10.1007/3-540-61996-8_37

M. Herrmann and C. Grothoff, Privacy-Implications of Performance-Based Peer Selection by Onion-Routers: A Real-World Case Study Using I2P, Privacy Enhancing Technologies Symposium, 2011.
DOI : 10.1007/978-3-642-22263-4_9

N. Hopper, E. Y. Vasserman, and E. Chan-tin, How much anonymity does network latency leak?, ACM Transactions on Information and System Security (TISSEC), vol.13, issue.2, p.13, 2010.
DOI : 10.1145/1315245.1315257

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.154.1587

K. Loesing, Measuring the tor network from public directory information, Proc. HotPETS, 2009.

K. Loesing, S. Murdoch, and R. Dingledine, A case study on measuring statistical data in the tor anonymity network. Financial Cryptography and Data Security, pp.203-215, 2010.

P. Maymounkov and D. Mazieres, Kademlia: A peer-to-peer information system based on the xor metric. Peer-to-Peer Systems, pp.53-65, 2002.

D. Mccoy, T. Kohno, and D. Sicker, Shining Light in Dark Places: Understanding the Tor Network, Proceedings of the 8th Privacy Enhancing Technologies Symposium, 2008.
DOI : 10.1007/978-3-540-70630-4_5

. Mixmaster, The mixmaster network

S. J. Murdoch, Hot or not, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, pp.27-36, 2006.
DOI : 10.1145/1180405.1180410

. Tor, The tor netowrk

M. K. Wright, M. Adler, B. N. Levine, and C. Shields, Passive-Logging Attacks Against Anonymous Communications Systems, ACM Transactions on Information and System Security, vol.11, issue.2, pp.1-34, 2008.
DOI : 10.1145/1330332.1330335

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.133.5072

L. Zzz and . Schimmer, Peer profiling and selection in the i2p anonymous network, PET-CON 2009.1., TU Dresden, p.3, 2009.