1. Dakshi Agrawal and Dogan Kesdogan . 2003. Measuring anonymity: The disclosure attack . IEEE Security & privacy 1, 6 ( 2003 ), 27–34. Dakshi Agrawal and Dogan Kesdogan. 2003. Measuring anonymity: The disclosure attack. IEEE Security & privacy 1, 6 (2003), 27–34.
2. SmarTor
3. Sebastian Angel and Srinath Setty . 2016 . Unobservable Communication over Fully Untrusted Infrastructure . In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16) . USENIX Association, Savannah, GA, 551–569. https://www.usenix.org/conference/osdi16/technical-sessions/presentation/angel Sebastian Angel and Srinath Setty. 2016. Unobservable Communication over Fully Untrusted Infrastructure. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16). USENIX Association, Savannah, GA, 551–569. https://www.usenix.org/conference/osdi16/technical-sessions/presentation/angel
4. Yawning Angel George Danezis Claudia Diaz Ania Piotrowska and David Stainton. 2017. Katzenpost Mix Network Specification. https://github.com/Katzenpost/docs/blob/master/specs/mixnet.rst. Yawning Angel George Danezis Claudia Diaz Ania Piotrowska and David Stainton. 2017. Katzenpost Mix Network Specification. https://github.com/Katzenpost/docs/blob/master/specs/mixnet.rst.
5. Denial of service or denial of security?