1. D. Chaum. Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms, Communications of the ACM, v. 24, n. 2, Feb. 1981, pages 84–88.
2. H. Federrath, A. Jerichow, D. Kesdogan,and A. Pfitzmann. Security in Public Mobile Communication Networks, Proceedings of the IFIP TC 6 International Workshop on Personal Wireless Communications, Verlag der Augustinus Buchhandlung Aachen, 1995, pages 105–116.
3. H. Federrath, A. Jerichow, and A. Pfitzmann. MIXes in Mobile Communication Systems: Location Management with Privacy, in Information Hiding, Ross Anderson ed., Springer-Verlag, LNCS vol. 1174, June 1996, pages 121–135.
4. D. Goldschlag, M. Reed, and P. Syverson. Privacy on the Internet, INET '97, Kuala Lumpur, Malaysia, June, 1997.
5. D. Goldschlag, M. Reed, and P. Syverson. Hiding Routing Information, in Information Hiding, Ross Anderson ed., Springer-Verlag, LNCS vol. 1174, June 1996, pages 137–150.