1. Anonymizer – Online privacy and personal VPN software Retrieved 17.07.14.
2. Bauer, K., McCoy, D., Grunwald, D., Douglas, S. & Tadayoshi, K. (2007). Low resource, routing attacks against anonymous systems. Technical Report CU-CS-1025-07. University of Colorado, USA.
3. Chakravarty, S. (2014). Traffic analysis attacks and defenses in low latency anonymous communication. Ph.D. Dissertation. Columbia University.
4. Untraceable electronic mail, return addresses and digital pseudonyms;Chaum;Communications of the ACM,1981
5. China bans anonymous internet messages Retrieved 17.07.14.