1. Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 24(2) (February 1981)
2. Christensen, A., et al.: Practical Onion Hacking: Find the real address of Tor clients. FortConsult (October 2006), http://www.fortconsult.net/images/pdf/Practical_Onion_Hacking.pdf
3. Clark, D.: Design Philosophy of the DARPA Internet Protocols. In: Proceedings of the ACM Special Interest Group on Data Communications, pp. 106–114. ACM Press, New York (1988)
4. Dingledine, R.: Tor: anonymity (November 2006), http://tor.eff.org/
5. Dingledine, R., Mathewson, N., Syverson, P.: Tor: The Second-Generation Onion Router. In: Proceedings of the 13th USENIX Security Symposium (August 2004)