Information Hiding, 7th International Workshop, Lecture Notes in Computer Science, vol.3727, 2005. ,
Untraceable electronic mail, return addresses, and digital pseudonyms, Communications of the ACM, vol.24, issue.2, pp.84-88, 1981. ,
DOI : 10.1145/358549.358563
A survey of anonymous communication channels, 2008. ,
Tor: The second-generation onion router, USENIX Security Symposium, pp.303-320, 2004. ,
Blending Different Latency Traffic with Alpha-mixing, Privacy Enhancing Technologies, pp.245-257, 2006. ,
DOI : 10.1007/11957454_14
URL : http://www.dtic.mil/get-tr-doc/pdf?AD=ADA576256
An Introduction to Probability Theory and Its Applications, volume I, 1965. ,
Analytic Combinatorics, 2009. ,
DOI : 10.1017/CBO9780511801655
URL : https://hal.archives-ouvertes.fr/inria-00072739
Parallel mixing, Proceedings of the 11th ACM conference on Computer and communications security , CCS '04, pp.220-226, 2004. ,
DOI : 10.1145/1030083.1030113
The Hitting Set Attack on Anonymity Protocols, Lecture Notes in Computer Science, vol.3200, pp.326-339, 2004. ,
DOI : 10.1007/978-3-540-30114-1_23
Provable Anonymity for Networks of Mixes, pp.26-38, 2005. ,
DOI : 10.1007/11558859_3
On blending attacks for mixes with memory, pp.39-52, 2005. ,
From a Trickle to a Flood: Active Attacks on Several Mix Types, Lecture Notes in Computer Science, vol.2578, pp.36-52, 2002. ,
DOI : 10.1007/3-540-36415-3_3
BetaRegularized. From mathworld ? A Wolfram Web Resource, 2013. URL http:// functions.wolfram.com/GammaBetaErf ,