1. Song, D.X., Wagner, D., Tian, X.: Timing analysis of keystrokes and timing attacks on ssh. In: Proceedings of 10th USENIX Security Symposium (2001)
2. Sun, Q., Simon, D.R., Wang, Y., Russell, W., Padmanabhan, V.N., Qiu, L.: Statistical identification of encrypted web browsing traffic. In: Proceedings of IEEE Symposium on Security and Privacy (2002)
3. Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 4 (1981)
4. Helsingius, J.: Press release: Johan helsingius closes his internet remailer (1996), http://www.penet.fi/press-english.html
5. Parekh, S.: Prospects for remailers - where is anonymity heading on the internet (1996), http://www.firstmonday.dk/issues/issue2/remailers/