1. Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84–88 (1981)
2. Jens, S.: Anonymity techniques–usability tests of major anonymity networks. Fakultät Informatik, p. 49 (2009)
3. Fatemeh, S. et al.: Towards measuring resilience in anonymous communication networks. In: Proceedings of ACM Workshop on Privacy in the Electronic Society, pp. 95–99 (2015)
4. Gilles, B. et al.: Robustness guarantees for anonymity. In: Computer Security Foundations Symposium, pp. 91–106 (2010)
5. Dingledine, R., Mathewson, N., Syverson, P.: Tor: the second-generation onion router. J. Frankl. Inst. 239(2), 135–139 (2004)