M. Barni, J. Herrera-joancomartí, S. Katzenbeisser, and F. Pérez-gonzález, Information Hiding, 7th International Workshop, Lecture Notes in Computer Science, vol.3727, 2005.

D. L. Chaum, Untraceable electronic mail, return addresses, and digital pseudonyms, Communications of the ACM, vol.24, issue.2, pp.84-88, 1981.
DOI : 10.1145/358549.358563

G. Danezis and C. Diaz, A survey of anonymous communication channels, 2008.

R. Dingledine, N. Mathewson, and P. F. Syverson, Tor: The second-generation onion router, USENIX Security Symposium, pp.303-320, 2004.

R. Dingledine, A. Serjantov, and P. F. Syverson, Blending Different Latency Traffic with Alpha-mixing, Privacy Enhancing Technologies, pp.245-257, 2006.
DOI : 10.1007/11957454_14

URL : http://www.dtic.mil/get-tr-doc/pdf?AD=ADA576256

W. Feller, An Introduction to Probability Theory and Its Applications, volume I, 1965.

P. Flajolet and R. Sedgewick, Analytic Combinatorics, 2009.
DOI : 10.1017/CBO9780511801655

URL : https://hal.archives-ouvertes.fr/inria-00072739

P. Golle and A. Juels, Parallel mixing, Proceedings of the 11th ACM conference on Computer and communications security , CCS '04, pp.220-226, 2004.
DOI : 10.1145/1030083.1030113

D. Kesdogan and L. Pimenidis, The Hitting Set Attack on Anonymity Protocols, Lecture Notes in Computer Science, vol.3200, pp.326-339, 2004.
DOI : 10.1007/978-3-540-30114-1_23

M. Klonowski and M. Kutylowski, Provable Anonymity for Networks of Mixes, pp.26-38, 2005.
DOI : 10.1007/11558859_3

L. O. Connor, On blending attacks for mixes with memory, pp.39-52, 2005.

A. Serjantov, R. Dingledine, and P. F. Syverson, From a Trickle to a Flood: Active Attacks on Several Mix Types, Lecture Notes in Computer Science, vol.2578, pp.36-52, 2002.
DOI : 10.1007/3-540-36415-3_3

E. W. Weisstein, BetaRegularized. From mathworld ? A Wolfram Web Resource, 2013. URL http:// functions.wolfram.com/GammaBetaErf