1. Barbaro, M., Zeller, T.: A Face Is Exposed for AOL Searcher No. 4417749 (2006),
http://www.nytimes.com/2006/08/09/technology/09aol.html
(accessed June 2010)
2. Boldi, P., Bonchi, F., Castillo, C., Vigna, S.: From ”Dango” to ”Japanese Cakes”: Query reformulation models and patterns. In: WI-IAT, pp. 183–190. IEEE Computer Society, Los Alamitos (2009)
3. Domingo-Ferrer, J., Solanas, A., Castella-Roca, J.: h(k)-private information retrieval from privacy-uncooperative queryable databases. Online Inf. Review 33(4), 720–744 (2009)
4. Fagin, R., Kumar, R., Sivakumar, D.: Comparing top k lists. SIAM J. Discrete Math. 17(1), 134–160 (2003)
5. Howe, D.C., Nissenbaum, H.: TrackMeNot: Resisting surveillance in web search. In: Lessons from the Identity Trail: Anonymity, Privacy, and Identity in a Networked Society, ch. 23, pp. 417–436. Oxford University Press, Oxford (2009)