-Mathematical modeling of Internet anonymity
-Attacks and counter-attacks of anonymity
-Security issues in raised by anonymity through the Internet
+Secret-key and public-key cryptography for guaranteeing anonymity
+Pseudorandomness use for anonymity
+Stochastic aspects of anonymity through the Internet
+Channel coding techniques for anonymity
+Efficient implementations of anonymity through the Internet
+Anonymity and privacy through the Internet
+Anonymous communication through the Internet