1. Berthold, Oliver and Langos, Heinrich (2002). Dummy traffic against long term intersection attacks. In Dingledine, Roger and Syverson, Paul, editors, Proceedings of Privacy Enhancing Technologies workshop (PET 2002), Springer-Verlag, LNCS 2482.
2. Berthold, Oliver, Pfitzmann, Andreas, and Standtke, Ronny (2000). The disadvantages of free MIX routes and how to overcome them. In Federrath, H., editor, Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, pages 30–45. Springer-Verlag, LNCS 2009.
3. Chaum, David (1981). Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 4(2).
4. Dai, Wei (1996). Pipenet 1.1. Usenet post.
5. Danezis, George (2003). Mix-networks with restricted routes. In Dingledine, Roger, editor, Proceedings of Privacy Enhancing Technologies workshop (PET 2003). Springer-Verlag, LNCS 2760.