R-Susceptibility, Proceedings of the 39th International ACM SIGIR conference on Research and Development in Information Retrieval, SIGIR '16, pp.365-374, 2016. ,
DOI : 10.1145/2911451.2911533
Tor: The second-generation onion router, USENIX Security'04, pp.21-21, 2004. ,
)???private information retrieval from privacy???uncooperative queryable databases, Online Information Review, vol.33, issue.4, pp.720-744, 2009. ,
DOI : 10.1108/14684520910985693
Cloak and Swagger: Understanding Data Sensitivity through the Lens of User Anonymity, 2014 IEEE Symposium on Security and Privacy, 2014. ,
DOI : 10.1109/SP.2014.38
PEAS: Private, Efficient and Accurate Web Search, 2015 IEEE Trustcom/BigDataSE/ISPA, 2015. ,
DOI : 10.1109/Trustcom.2015.421
URL : https://hal.archives-ouvertes.fr/hal-01159179