J. A. Biega, K. P. Gummadi, I. Mele, D. Milchevski, C. Tryfonopoulos et al., R-Susceptibility, Proceedings of the 39th International ACM SIGIR conference on Research and Development in Information Retrieval, SIGIR '16, pp.365-374, 2016.
DOI : 10.1145/2911451.2911533

R. Dingledine, N. Mathewson, and P. Syverson, Tor: The second-generation onion router, USENIX Security'04, pp.21-21, 2004.

J. Domingo-ferrer, A. Solanas, and J. , )???private information retrieval from privacy???uncooperative queryable databases, Online Information Review, vol.33, issue.4, pp.720-744, 2009.
DOI : 10.1108/14684520910985693

S. T. Peddinti, A. Korolova, E. Bursztein, and G. Sampemane, Cloak and Swagger: Understanding Data Sensitivity through the Lens of User Anonymity, 2014 IEEE Symposium on Security and Privacy, 2014.
DOI : 10.1109/SP.2014.38

A. Petit, T. Cerqueus, S. B. Mokhtar, L. Brunie, and H. Kosch, PEAS: Private, Efficient and Accurate Web Search, 2015 IEEE Trustcom/BigDataSE/ISPA, 2015.
DOI : 10.1109/Trustcom.2015.421

URL : https://hal.archives-ouvertes.fr/hal-01159179