+Cryptography and cryptanalysis for Internet anonymity
+Mathematical modeling of Internet anonymity
+Attacks and counter-attacks of anonymity
+Security issues in raised by anonymity through the Internet
+Channel coding techniques for anonymity
+Security proofs in the context of Internet Anonymity
+