1. Alpern B, Schneider FB (1983) Key exchange using ‘keyless cryptography’. Inf Process Lett 16(2):79–81
2. Astolfi F, Kroese J, Van Oorschot J (2015) I2p-the invisible internet project. Web Technology Report
3. Cambiaso E, Vaccari I, Patti L, Aiello M (2019) Darknet security: a categorization of attacks to the TOR network. In: ITASEC
4. Caprolu M, Raponi S, Oligeri G, Di Pietro R (2020) Cryptomining makes noise: a machine learning approach for cryptojacking detection, 1910.09272
5. Chaum DL (1981) Untraceable electronic mail, return addresses, and digital pseudonyms. Commun ACM 24(2):84–90. https://doi.org/10.1145/358549.358563