Browser statistics. http://www.w3schools.com/browsers/browsers.stats.asp, September 2014.
C. Andersson, R. Lundin, and S. Fischer-Hubner. Privacy-enhanced wap browsing with mcrowds-anonymity properties and performance evaluation of the mcrowds system. In Proceedings of the Fourth annual ISSA 2004 IT Security Conference, Johannesburg, South Africa, July 2004.
S. Claufi and S. Schiffner. Anonymitat auf Anwendungsebene. In Proceedings of Sicherheit 2006, pages 171-182, Bonn, Germany, 2006. GI Lecture Notes in Informatics P-77.
S. Claufi and S. Schiffner. Structuring anonymity metrics. In DIM '06: Proceedings of the Second A CM Workshop on Digital Identity Management, pages 55-62, New York, NY, USA, 2006. ACM Press.
C. Diaz, C. Troncoso, and G. Danezis. Does additional information always reduce anonymity? In WPES '07: Proceedings of the 2007 A CM Workshop on Privacy in Electronic Society, pages 72-75, New York, NY, USA, 2007. ACM.
Fort Consult. Practical onion hacking: Finding the real address of Tor clients. October 2006.
K. Irwin and T. Yu. An identifiability-based access control model for privacy protection in open systems. In WPES '04: Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, pages 43-43, New York, NY, USA, 2004. ACM Press.
D. Kesdogan, V. Pham, and L. Pimenidis. Information disclosure in identity management. In Proceedings of 12th Nordic Workshop on IT-Security, NordSec, Reykjavik, Iceland, Oct 2007.
S. J. Murdoch. Hot or not: Revealing hidden services by their clock skew. In 13th ACM Conference on Computer and Communications Security (ACM CCS), Alexandria, Virginia, USA, 2006.
A. Panchenko and L. Pimenidis. Fundamental Limits of Anonymity Provided by Crowds. In 8th International Symposium on System and Information Security SSI 2006, Sao Jose dos Campos, Sao Paulo, Brazil, 8-10 November 2006.
A. Panchenko and L. Pimenidis. Crowds Revisited: Practically Effective Predecessor Attack. In Proceedings of the 12th Nordic Workshop on Secure IT-Systems (NordSec 2007), Reykjavik, Iceland, October 2007.
A. Panchenko and L. Pimenidis. Cross-Layer Attack on Anonymizing Networks. In Proceedings of the 15th International Conference on Telecommunications (ICT 2008), St. Petersburg, Russia, June 2008. IEEE Xplore.
A. Pashalidis and B. Meyer. Linking Anonymous Transactions: The Consistent View Attack. In G. Danezis and P. Golle, editors, Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006), Cambridge, UK, June 2006. Springer.
M. K. Reiter and A. D. Rubin. Crowds: Anonymity for Web Transactions. ACM Transactions on Information and System Security, pages 66-92, April 1998.
V. Shmatikov. Probabilistic model checking of an anonymity system. Journal of Computer Security, 12(3-4):355-377, 2004.
A. Vaha-Sipila and T. Virtanen. BT-Crowds: Crowds-Style Anonymity with Bluetooth and Java. In HICSS '05: Proceedings of the 38th Annual Hawaii International Conference on System Sciences (HICSS'05)-Track 9, page 320.1, Washington, DC, USA, 2005. IEEE Computer Society.
M. Wright, M. Adler, B. N. Levine, and C. Shields. The predecessor attack: An analysis of a threat to anonymous communications systems. In ACM Transactions on Information and System Security TISSEC'04, volume 7 (4), pages 489-522. ACM Press, November 2004.