B. Bose, H. Guo, E. Kranakis, A. Maheshwari, P. Morin et al., On the false-positive rate of Bloom filters, Information Processing Letters, vol.108, issue.4, pp.210-213, 2008.
DOI : 10.1016/j.ipl.2008.05.018

D. Chaum, C. Of-the-acm, R. Rivest, and D. L. Chaum, Untraceable electronic mail, return addresses, and digital pseudonyms Computing arbitrary functions of encrypted data, GRS99] David Goldschlag, Michael Reed, and Paul Syverson. Onion routing, pp.84-8897, 1981.

J. Kong and X. Hong, ANODR, Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing , MobiHoc '03, pp.291-302, 2003.
DOI : 10.1145/778415.778449

G. Montenegro and C. Castelluccia, Statistically unique and cryptographically verifiable (sucv) identifiers and addresses, 20th Annual Network and Distributed System Security Symposium, 2002.

A. Alireza, D. Nezhad, A. Makrakis, and . Miri, Anonymous topology discovery for multihop wireless sensor networks, Proceedings of the 3rd ACM workshop on QoS and security for wireless and mobile networks, Q2SWinet '07, pp.78-85, 2007.

. Alirezaa, A. Nezhad, D. Miri, . Makrakis, . Luiso et al., Privacy within pervasive communications, Telecommunication Systems, vol.40, pp.101-116, 2009.

P. Paillier, Public-Key Cryptosystems Based on Composite Degree Residuosity Classes, Proceedings of the 17th international conference on Theory and application of cryptographic techniques, EUROCRYPT'99, pp.223-238, 1999.
DOI : 10.1007/3-540-48910-X_16

]. K. Pat02 and . Paterson, Cryptography from pairings : a snapshot of current research, pp.41-54, 2002.

A. Pfitzmann, M. Köhntoppscb06, ]. D. Sy, R. Chen, and L. Bao, Anonymity, unobservability, and pseudonymity ? a proposal for terminology Designing Privacy Enhancing Technologies Odar : On-demand anonymous routing in ad hoc networks, Mobile Adhoc and Sensor Systems (MASS) IEEE International Conference on, pp.1-9, 2001.

Y. Zhang, W. Liu, W. Lou, and Y. Fang, MASK: anonymous on-demand routing in mobile ad hoc networks, IEEE Transactions on Wireless Communications, vol.5, issue.9, pp.2376-2385, 2006.
DOI : 10.1109/TWC.2006.1687761