. Fun-link_a-(-i-p, 31 fun LINK_b ( I P , i d ) : l i n k [ p r i v a t e ] . 32 fun L I NK _ c ( i d , b i t s t r i n g ) : l i n k [ p r i v a t e ] . 33 fun LINK_d ( i d , r e q u e s t ) : l i n k

R. Gross and A. Acquisti, Information revelation and privacy in online social networks, Proceedings of the 2005 ACM workshop on Privacy in the electronic society , WPES '05, pp.71-80, 2005.
DOI : 10.1145/1102199.1102214

B. Susan and . Barnes, A privacy paradox: Social networking in the united states, First Monday, vol.11, issue.9, 2006.

G. Greenwald, E. Macaskill, and L. Poitras, Edward snowden: the whistleblower behind the nsa surveillance revelations. The Guardian, p.2013

Y. Liu, P. Krishna, B. Gummadi, A. Krishnamurthy, and . Mislove, Analyzing facebook privacy settings, Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference, IMC '11, pp.61-70, 2011.
DOI : 10.1145/2068816.2068823

G. Inc, European privacy requests for search removals

S. Gibbs, Google to extend 'right to be forgotten' to all its domains accessed in EU. The Guardian, 2016.

M. Inc, Bing To Use Location for RTBF. http://blogs.bing. com/search/august-2016/bing-to-use-location-for-rtbf, 2016.

E. Daniel, D. Rose, and . Levinson, Understanding user goals in web search, Proceedings of the 13th International Conference on World Wide Web, pp.13-19, 2004.

G. Pass, A. Chowdhury, and C. Torgeson, A picture of search, Proceedings of the 1st international conference on Scalable information systems , InfoScale '06, p.1, 2006.
DOI : 10.1145/1146847.1146848

M. Barbaro, T. Zeller, and S. Hansell, A face is exposed for aol searcher no. 4417749, New York Times, vol.9, p.8, 2006.

E. Adar, S. Daniel, . Weld, N. Brian, . Bershad et al., Why we search, Proceedings of the 16th international conference on World Wide Web , WWW '07, pp.161-170, 2007.
DOI : 10.1145/1242572.1242595

J. David, D. Brenes, and . Gayo-avello, Stratified analysis of aol query log, Information Sciences, vol.179, issue.12, pp.1844-1858, 2009.

J. Huang, N. Efthimis, and . Efthimiadis, Analyzing and evaluating query reformulation strategies in web search logs, Proceeding of the 18th ACM conference on Information and knowledge management, CIKM '09, pp.77-86, 2009.
DOI : 10.1145/1645953.1645966

P. Heymann, G. Koutrika, and H. Garcia-molina, Can social bookmarking improve web search?, Proceedings of the international conference on Web search and web data mining , WSDM '08, pp.195-206, 2008.
DOI : 10.1145/1341531.1341558

R. Jones, R. Kumar, B. Pang, and A. Tomkins, "I know what you did last summer", Proceedings of the sixteenth ACM conference on Conference on information and knowledge management , CIKM '07, pp.909-914, 2007.
DOI : 10.1145/1321440.1321573

B. Bi, M. Shokouhi, M. Kosinski, and T. Graepel, Inferring the demographics of search users, Proceedings of the 22nd international conference on World Wide Web, WWW '13, pp.131-140, 2013.
DOI : 10.1145/1015330.1015425

J. Daniel and . Solove, Nothing to hide: The false tradeoff between privacy and security, 2011.

T. Gary and . Marx, Privacy and technology. http://web.mit.edu/ gtmarx/www/privantt.html. Revision of material that appeared in The World and I, Sept, 1990.

B. Schneier, The eternal value of privacy. https://www.schneier. com/essays/archives, 2006.

H. Pang, X. Ding, and X. Xiao, Embellishing text search queries to protect user privacy, Proceedings of the VLDB Endowment, pp.598-607, 2010.
DOI : 10.14778/1920841.1920918

URL : http://www.comp.nus.edu.sg/%7Evldb2010/proceedings/files/papers/R53.pdf

H. Pang, J. Shen, and R. Krishnan, Privacypreserving similarity-based text retrieval, ACM Transactions on Internet Technology (TOIT), vol.10, issue.1, p.4, 2010.

M. Naehrig, K. Lauter, and V. Vaikuntanathan, Can homomorphic encryption be practical?, Proceedings of the 3rd ACM workshop on Cloud computing security workshop, CCSW '11, pp.113-124, 2011.
DOI : 10.1145/2046660.2046682

URL : http://cryptojedi.org/papers/homenc-20110901.pdf

F. Saint-jean, A. Johnson, D. Boneh, and J. Feigenbaum, Private web search, Proceedings of the 2007 ACM workshop on Privacy in electronic society , WPES '07, pp.84-90, 2007.
DOI : 10.1145/1314333.1314351

S. Romanosky and C. Kuo, Foxtor: Anonymous web browsing, Tor GUI Competition, 2006.

C. Jackson, A. Bortz, D. Boneh, C. John, and . Mitchell, Protecting browser state from web privacy attacks, Proceedings of the 15th international conference on World Wide Web , WWW '06, pp.737-744, 2006.
DOI : 10.1145/1135777.1135884

URL : http://www.ftc.gov/os/comments/behavioraladvertising/071020stanforduniv.pdf

F. Paul, . Syverson, M. David, . Goldschlag, G. Michael et al., Anonymous connections and onion routing, Proceedings of the 1997 IEEE Symposium on Security and Privacy, SP'97, pp.44-54, 1997.

R. Dingledine, N. Mathewson, and P. Syverson, Tor: The second-generation onion router, Proceedings of the 13th Conference on USENIX Security Symposium, USENIX Security'04, pp.21-21, 2004.
DOI : 10.21236/ADA465464

H. Corrigan-gibbs and B. Ford, Dissent, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pp.340-350, 2010.
DOI : 10.1145/1866307.1866346

D. Isaac-wolinsky, H. Corrigan-gibbs, and B. Ford, Dissent in numbers: Making strong anonymity scale, Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation , OSDI'12, 2012.

S. Ben-mokhtar, G. Berthou, A. Diarra, V. Quéma, and A. Shoker, RAC: A Freerider-Resilient, Scalable, Anonymous Communication Protocol, 2013 IEEE 33rd International Conference on Distributed Computing Systems
DOI : 10.1109/ICDCS.2013.52

URL : https://hal.archives-ouvertes.fr/hal-00945795

J. Domingo-ferrer, M. Bras-amorós, Q. Wu, and J. Manjón, User-private information retrieval based on a peer-to-peer community, Data & Knowledge Engineering, vol.68, issue.11, pp.681237-1252, 2009.
DOI : 10.1016/j.datak.2009.06.004

K. Michael, . Reiter, D. Aviel, and . Rubin, Crowds: Anonymity for web transactions, ACM Transactions on Information and System Security (TISSEC), vol.1, issue.1, pp.66-92, 1998.

J. Domingo-ferrer, )???private information retrieval from privacy???uncooperative queryable databases, Online Information Review, vol.33, issue.4, pp.720-744, 2009.
DOI : 10.1016/0022-0000(84)90070-9

V. Toubiana, L. Subramanian, and H. Nissenbaum, Trackmenot: Enhancing the privacy of web search. arXiv preprint, 2011.

S. Teja, P. , and N. Saxena, On the effectiveness of anonymizing networks for web search privacy, Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASI- ACCS '11, pp.483-489, 2011.

S. Teja, P. , and N. Saxena, On the privacy of web search based on query obfuscation: a case study of trackmenot, Proceedings of the 10th International Conference on Privacy Enhancing Technologies, PETS'10, pp.19-37, 2010.

A. Gervais and R. Shokri, Adish Singla, Srdjan Capkun, and Vincent Lenders Quantifying web-search privacy, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security , CCS '14, pp.966-977, 2014.
DOI : 10.1145/2660267.2660367

P. Eckersley, How Unique Is Your Web Browser?, Proceedings of the 10th International Conference on Privacy Enhancing Technologies, PETS'10, pp.1-18, 2010.
DOI : 10.1109/TDSC.2005.26

URL : http://www.freehaven.net/anonbib/cache/pets2010:eckersley2010unique.pdf

N. Nikiforakis, A. Kapravelos, W. Joosen, C. Kruegel, F. Piessens et al., Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting, 2013 IEEE Symposium on Security and Privacy, pp.541-555, 2013.
DOI : 10.1109/SP.2013.43

E. Gabber, B. Phillip, . Gibbons, M. David, Y. Kristol et al., Consistent, yet anonymous, Web access with LPWA, Communications of the ACM, vol.42, issue.2, pp.42-47, 1999.
DOI : 10.1145/293411.293447

URL : http://theory.stanford.edu/~matias/papers/lpwa-cacm.pdf

M. Shapiro, Structure and Encapsulation in Distributed Systems: the Proxy Principle, Proceedings of the 1986 IEEE 6th International Conference on Distributed Computing Systems, p.86
URL : https://hal.archives-ouvertes.fr/inria-00444651

H. A. Seid and A. L. , Virtual private network, US Patent, vol.5, p.768271, 1998.

L. David and . Chaum, Untraceable electronic mail, return addresses, and digital pseudonyms, Communications of the ACM, vol.24, issue.2, pp.84-90, 1981.

O. Berthold, H. Federrath, and S. Köpsell, Web MIXes: A System for Anonymous and Unobservable Internet Access, Designing Privacy Enhancing Technologies, pp.115-129, 2001.
DOI : 10.1007/3-540-44702-4_7

R. Benedikt-westermann, L. Wendolsky, D. Pimenidis, and . Kesdogan, Cryptographic protocol analysis of an. on, International Conference on Financial Cryptography and Data Security, pp.114-128

A. Viejo and J. Castellà-roca, Using social networks to distort users??? profiles generated by web search engines, Computer Networks, vol.54, issue.9, pp.1343-1357, 2010.
DOI : 10.1016/j.comnet.2009.11.003

A. Erola, J. Castellà-roca, A. Viejo, and J. , Exploiting social networks to provide privacy in personalized web search, Journal of Systems and Software, vol.84, issue.10, pp.1734-1745, 2011.
DOI : 10.1016/j.jss.2011.05.009

J. Castellà-roca, A. Viejo, J. Herrera, and -. , Preserving user???s privacy in web search engines, Computer Communications, vol.32, issue.13-14, 2009.
DOI : 10.1016/j.comcom.2009.05.009

C. Romero-tris, A. Viejo, and J. Castella-roca, Improving Query Delay in Private Web Search, 2011 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, pp.200-206, 2011.
DOI : 10.1109/3PGCIC.2011.61

Y. Lindell and E. Waisbard, Private Web Search with Malicious Adversaries, Proceedings of the 10th International Conference on Privacy Enhancing Technologies, PETS'10, pp.220-235, 2010.
DOI : 10.1007/0-387-34805-0_22

C. Romero-tris, J. Castella-roca, and A. Viejo, Multiparty private web search with untrusted partners, Proceedings of the 2011 7th International Conference on Security and Privacy in Communication Networks

A. Wai-han-soo, A. Samsudin, and . Goh, Efficient mental card shuffling via optimised arbitrary-sized benes permutation network, Proceedings of the 5th International Conference on Information Security, pp.446-458, 2002.

T. Elgamal, A public key cryptosystem and a signature scheme based on discrete logarithms, Proceedings of Advances in Cryptology, p.84

M. Jakobsson and A. Juels, Millimix: Mixing in small batches, 1999.

Z. Cao, L. Liu, and Z. Yan, An improved lindellwaisbard private web search scheme, International Journal of Network Security, vol.18, issue.3, pp.538-543, 2016.

D. Rebollo-monedero, J. Forne, and J. Domingo-ferrer, Query Profile Obfuscation by Means of Optimal Query Exchange Between Users, IEEE Transactions on Dependable and Secure Computing, vol.9, issue.5, pp.641-654, 2012.
DOI : 10.1109/TDSC.2012.16

Y. Elovici, B. Shapira, and A. Maschiach, A new privacy model for hiding group interests while accessing the Web, Proceeding of the ACM workshop on Privacy in the Electronic Society , WPES '02, pp.63-70, 2002.
DOI : 10.1145/644527.644534

Y. Elovici, C. Glezer, and B. Shapira, Enhancing customer privacy while searching for products and services on the world wide web [73] Bracha Shapira, Yuval Elovici, Adlay Meshiach, and Tsvi Kuflik. Praw -a privacy model for the web, Internet Research Journal of the American Society for Information Science and Technology, vol.15, issue.562, pp.378-399159, 2005.

M. Murugesan and C. Clifton, Providing Privacy through Plausibly Deniable Search, SDM, pp.768-779, 2009.
DOI : 10.1137/1.9781611972795.66

URL : http://epubs.siam.org/doi/pdf/10.1137/1.9781611972795.66

A. Viejo and D. Sanchez, Providing useful and private Web search by means of social network profiling, 2013 Eleventh Annual Conference on Privacy, Security and Trust, pp.358-361, 2013.
DOI : 10.1109/PST.2013.6596089

A. Viejo and D. Sánchez, Profiling social networks to provide useful and privacy-preserving web search, Journal of the Association for Information Science and Technology, vol.36, issue.9, pp.2444-2458, 2014.
DOI : 10.1016/j.knosys.2012.07.001

C. Daniel, H. Howe, and . Nissenbaum, Trackmenot: Resisting surveillance in web search. Lessons from the Identity Trail: Anonymity, Privacy, and Identity in a Networked Society, pp.417-436, 2009.

A. Viejo, J. Castella-roca, O. Bernadó, and J. , Single-party private web search, 2012 Tenth Annual International Conference on Privacy, Security and Trust, pp.1-8, 2012.
DOI : 10.1109/PST.2012.6297913

D. Sánchez, J. Castellà-roca, and A. Viejo, Knowledge-based scheme to create privacy-preserving but semantically-related queries for web search engines, Information Sciences, vol.218, pp.17-30, 2013.
DOI : 10.1016/j.ins.2012.06.025

A. Inc and . Dmoz, An Open Directory Project (ODP), 1998.

A. George and . Miller, Wordnet: a lexical database for english, Communications of the ACM, vol.38, issue.11, pp.39-41, 1995.

D. Rebollo-monedero and J. Forné, Optimized Query Forgery for Private Information Retrieval, IEEE Transactions on Information Theory, vol.56, issue.9, pp.4631-4642, 2010.
DOI : 10.1109/TIT.2010.2054471

F. Shaozhi-ye, R. Wu, H. Pandey, and . Chen, Noise injection for search privacy protection, Proceedings of the 2009 International Conference on Computational Science and Engineering, pp.9-10, 2009.

A. Arampatzis, S. Pavlos, G. Efraimidis, and . Drosatos, A query scrambler for search privacy on the internet, Information Retrieval, vol.53, issue.4, pp.657-679, 2013.
DOI : 10.1145/1721654.1721674

A. Arampatzis, G. Drosatos, S. Pavlos, and . Efraimidis, Versatile Query Scrambling for Private Web Search, Information Retrieval Journal, vol.65, issue.12, pp.331-358, 2015.
DOI : 10.1007/978-0-387-30162-4_175

M. Juárez and V. Torra, Toward a Privacy Agent for Information Retrieval, International Journal of Intelligent Systems, vol.3, issue.1, pp.606-622, 2013.
DOI : 10.1145/1165774.1165776

M. Juárez and V. Torra, A self-adaptive classification for the dissociating privacy agent, 2013 Eleventh Annual Conference on Privacy, Security and Trust, pp.44-50, 2013.
DOI : 10.1109/PST.2013.6596035

M. Juarez and V. Torra, DisPA: An Intelligent Agent for Private Web Search, Advanced Research in Data Privacy, pp.389-405
DOI : 10.1007/978-3-319-09885-2_21

Y. Xu, K. Wang, B. Zhang, and Z. Chen, Privacyenhancing personalized web search, Proceedings of the 16th international conference on World Wide Web, p.7

G. Chen, H. Bai, L. Shou, K. Chen, and Y. Gao, UPS, Proceedings of the 34th international ACM SIGIR conference on Research and development in Information, SIGIR '11, pp.615-624, 2011.
DOI : 10.1145/2009916.2009999

C. Díaz and S. Seys, Joris Claessens, and Bart Preneel. Towards measuring anonymity, Proceedings of the 2nd International Conference on Privacy Enhancing Technologies, PETS'02, pp.54-68

W. Edward, . Felten, A. Michael, and . Schneider, Timing attacks on web privacy, Proceedings of the 7th ACM conference on Computer and communications security, CCS '00, pp.25-32, 2000.

R. Focardi, R. Gorrieri, R. Lanotte, A. Maggiolo-schettini, F. Martinelli et al., Formal Models of Timing Attacks on Web Privacy1 1Research partially supported by MURST Progetto Cofinanziato TOSCA., Electronic Notes in Theoretical Computer Science, vol.62, pp.229-243, 2002.
DOI : 10.1016/S1571-0661(04)00329-9

S. Nathan, R. Evans, C. Dingledine, and . Grothoff, A practical congestion attack on tor using long paths, Proceedings of the 18th Conference on USENIX Security Symposium, USENIX Security'09, pp.33-50, 2009.

R. Al-rfou, W. Jannen, and N. Patwardhan, Trackmenotso-good-after-all . arXiv preprint, 2012.

C. Cortes and V. Vapnik, Support-vector networks, Machine Learning, vol.1, issue.3, pp.273-297, 1995.
DOI : 10.1007/BF00994018

R. David and . Cox, The regression analysis of binary sequences, Journal of the Royal Statistical Society. Series B (Methodological), pp.215-242, 1958.

J. Macqueen, Some methods for classification and analysis of multivariate observations, Proceedings of the 5th Berkeley symposium on mathematical statistics and probability, p.67

C. Hsu and C. Lin, A comparison of methods for multiclass support vector machines, IEEE Transactions on Neural Networks, vol.13, issue.2, pp.415-425, 2002.

J. Weston and C. Watkins, Support vector machines for multiclass pattern recognition, ESANN, pp.219-224, 1999.

C. John and . Platt, 12 fast training of support vector machines using sequential minimal optimization Advances in kernel methods, pp.185-208, 1999.

H. John, . Aldrich, D. Forrest, and . Nelson, Linear probability, logit, and probit models, Sage, vol.45, 1984.

W. Edward and . Forgy, Cluster analysis of multivariate data: efficiency versus interpretability of classifications, Biometrics, vol.21, pp.768-769, 1965.

Y. Yang, An evaluation of statistical approaches to text categorization, Information Retrieval, vol.1, issue.1/2, pp.69-90, 1999.
DOI : 10.1023/A:1009982220290

S. Guha, M. Jain, N. Venkata, and . Padmanabhan, Koi: A location-privacy platform for smartphone apps, Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation, pp.14-14, 2012.

B. Blanchet, An efficient cryptographic protocol verifier based on prolog rules, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., p.82, 2001.
DOI : 10.1109/CSFW.2001.930138

A. Armando, D. Basin, Y. Boichut, Y. Chevalier, L. Compagna et al., The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications, Computer Aided Verification, pp.281-285, 2005.
DOI : 10.1007/11513988_27

URL : https://hal.archives-ouvertes.fr/inria-00000408

B. Mark, . Abbott, L. Larry, and . Peterson, Increasing network throughput by integrating protocol layers, IEEE/ACM Transactions on Networking (TON), vol.1, issue.5, pp.600-610, 1993.

Y. Ki-lee, K. Sakiyama, L. Batina, and I. Verbauwhede, Elliptic-Curve-Based Security Processor for RFID, IEEE Transactions on Computers, vol.57, issue.11, pp.1514-1527, 2008.
DOI : 10.1109/TC.2008.148

R. Nachiketh, S. Potlapally, A. Ravi, . Raghunathan, K. Niraj et al., A study of the energy consumption characteristics of cryptographic algorithms and security protocols, IEEE Transactions on mobile computing, vol.5, issue.2, pp.128-143, 2006.

C. Spearman, footrule'for measuring correlation, British Journal of Psychology, vol.2, issue.1, pp.89-108, 1904.

G. Maurice and . Kendall, A new measure of rank correlation, Biometrika, vol.30, issue.12, pp.81-93, 1938.

K. Järvelin and J. Kekäläinen, Cumulated gain-based evaluation of IR techniques, ACM Transactions on Information Systems, vol.20, issue.4, pp.422-446, 2002.
DOI : 10.1145/582415.582418

X. Shen, B. Tan, and C. Zhai, Privacy protection in personalized search, ACM SIGIR Forum, pp.4-17, 2007.
DOI : 10.1145/1273221.1273222

X. Shen, B. Tan, and C. Zhai, Implicit user modeling for personalized search, Proceedings of the 14th ACM international conference on Information and knowledge management , CIKM '05, pp.824-831, 2005.
DOI : 10.1145/1099554.1099747

!. Yahoo and . Inc, Yahoo advertising policies. https://adspecs.yahoo. com

U. S. The and . Congress, Fair Debt Collection Practices act (FDCPA). https://www.ncjrs.gov, 1977.

U. S. The and . Congress, Health Insurance Portability and Accountability Act (HIPAA)

U. S. The and . Congress, Electronic Communications Privacy Act (ECPA) http://www.gpo.gov/fdsys/pkg/STATUTE-100/pdf/ STATUTE-100-Pg1848.pdf, 1986.

A. Sai-teja-peddinti, E. Korolova, G. Bursztein, and . Sampemane, Cloak and swagger: Understanding data sensitivity through the lens of user anonymity, Proceedings of the 2014 IEEE Symposium on Security and Privacy, pp.493-508, 2014.

P. Ullegaddi and V. Varma, A simple unsupervised query categorizer for web search engines, ICON'10, 2011.

L. Li, G. Xu, Z. Yang, Y. Zhang, and M. Kitsuregawa, A Feature-Free Flexible Approach to Topical Classification of Web Queries, 2011 Seventh International Conference on Semantics, Knowledge and Grids
DOI : 10.1109/SKG.2011.23

M. Alemzadeh and F. Karray, An Efficient Method for Tagging a Query with Category Labels Using Wikipedia towards Enhancing Search Engine Results, 2010 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, pp.192-195, 2010.
DOI : 10.1109/WI-IAT.2010.267

M. Steven, . Beitzel, C. Eric, O. Jensen, . Frieder et al., Improving automatic query classification via semi-supervised learning, Proceedings of the 5th IEEE International Conference on Data Mining, ICDM'05, p.8, 2005.

M. Steven, . Beitzel, C. Eric, O. Jensen, D. Frieder et al., Automatic web query classification using labeled and unlabeled training data, Proceedings of the 28th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR '05, pp.581-582, 2005.

M. Steven, . Beitzel, C. Eric, . Jensen, D. David et al., Automatic classification of web queries using very large unlabeled query logs, ACM Transactions on Information Systems (TOIS), vol.25, issue.2, p.9, 2007.

D. Shen, R. Pan, J. Sun, J. J. Pan, and K. Wu, Query enrichment for web-query classification, ACM Transactions on Information Systems, vol.24, issue.3, pp.320-352, 2006.
DOI : 10.1145/1165774.1165776

T. Zsolt, D. Kardkovács, Z. Tikk, and . Bánsághi, The ferrety algorithm for the kdd cup 2005 problem, ACM SIGKDD Explorations Newsletter, vol.7, issue.2, pp.111-116, 2005.

D. Vogel, S. Bickel, P. Haider, R. Schimpfky, P. Siemen et al., Classifying search engine queries using the web as background knowledge, ACM SIGKDD Explorations Newsletter, vol.7, issue.2, pp.117-122, 2005.
DOI : 10.1145/1117454.1117469

R. Lee and . Dice, Measures of the amount of ecologic association between species, Ecology, vol.26, issue.3, pp.297-302, 1945.

A. Singhal, Modern information retrieval: A brief overview, IEEE Data Eng. Bull, vol.24, issue.4, pp.35-43, 2001.

P. Jaccard, THE DISTRIBUTION OF THE FLORA IN THE ALPINE ZONE.1, New Phytologist, vol.11, issue.2, pp.37-50, 1912.
DOI : 10.1111/j.1469-8137.1912.tb05611.x

C. D. Manning, M. Surdeanu, J. Bauer, J. Finkel, S. J. Bethard et al., The Stanford CoreNLP Natural Language Processing Toolkit, Proceedings of 52nd Annual Meeting of the Association for Computational Linguistics: System Demonstrations, pp.55-60, 2014.
DOI : 10.3115/v1/P14-5010

F. Martin and . Porter, An algorithm for suffix stripping. Program, pp.130-137, 1980.

S. Biswas and . News, Digital Indians: Ben Gomes, 2013.

M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann et al., The WEKA data mining software, ACM SIGKDD Explorations Newsletter, vol.11, issue.1, pp.10-18, 2009.
DOI : 10.1145/1656274.1656278

J. Platt, Sequential minimal optimization: A fast algorithm for training support vector machines, 1998.

C. Chang and C. Lin, LIBSVM, ACM Transactions on Intelligent Systems and Technology, vol.2, issue.3, pp.27-28, 2011.
DOI : 10.1145/1961189.1961199

S. Le-cessie and J. C. Van-houwelingen, Ridge Estimators in Logistic Regression, Applied Statistics, vol.41, issue.1, pp.191-201, 1992.
DOI : 10.2307/2347628

K. Lange, A quasi-newton acceleration of the em algorithm, Statistica sinica, pp.1-18, 1995.

S. Teja, P. , and N. Saxena, Web search query privacy: Evaluating query obfuscation and anonymizing networks1, Journal of Computer Security, vol.22, issue.1, pp.155-199, 2014.

A. Tsymbal, The problem of concept drift: definitions and related work, 2004.

T. Mikolov, K. Chen, G. Corrado, and J. Dean, Efficient estimation of word representations in vector space, 2013.

H. Gene, C. Golub, and . Reinsch, Singular value decomposition and least squares solutions, Numerische mathematik, vol.14, issue.5, pp.403-420, 1970.

G. Salton, A. Wong, and C. S. Yang, A vector space model for automatic indexing, Communications of the ACM, vol.18, issue.11, pp.613-620, 1975.
DOI : 10.1145/361219.361220

G. Inc, Google trends. https://www.google.com/trends, p.2012

C. Bron and J. Kerbosch, Algorithm 457: finding all cliques of an undirected graph, Communications of the ACM, vol.16, issue.9, pp.575-577, 1973.
DOI : 10.1145/362342.362367

C. Fontaine and F. Galand, A Survey of Homomorphic Encryption for Nonspecialists, EURASIP Journal on Information Security, vol.15, issue.2, pp.1-10, 2007.
DOI : 10.1016/j.ipl.2005.09.016

URL : https://hal.archives-ouvertes.fr/inria-00504233

E. Barker, A. R. , D. Balouek, A. Carpen-amarie, G. Charrier et al., NIST Special Publication 800-131A Transitions (revision 1): Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths Adding virtualization capabilities to the Grid'5000 testbed, Proceedings of the 2nd International Conference on Cloud Computing and Services Science, pp.3-20, 2013.

G. John, J. L. Kemeny, and . Snell, Finite markov chains, 1960.

E. Tomita, A. Tanaka, and H. Takahashi, The worst-case time complexity for generating all maximal cliques and computational experiments, Theoretical Computer Science, vol.363, issue.1, pp.28-42, 2006.
DOI : 10.1016/j.tcs.2006.06.015

D. Eppstein, M. Löffler, and D. Strash, Listing All Maximal Cliques in Sparse Graphs in Near-Optimal Time, International Symposium on Algorithms and Computation, pp.403-414, 2010.
DOI : 10.1007/s00373-007-0738-8

L. Joseph and . Fleiss, Measuring nominal scale agreement among many raters, Psychological bulletin, vol.76, issue.5, p.378, 1971.

J. Richard, L. Gary, and G. Koch, The measurement of observer agreement for categorical data, biometrics, pp.159-174, 1977.

I. Ludmila, . Kuncheva, J. Christopher, C. A. Whitaker, . Shipp et al., Limits on the majority vote accuracy in classifier fusion, Pattern Analysis & Applications, vol.6, issue.1, pp.22-31, 2003.

G. Panagiotis, F. Ipeirotis, J. Provost, and . Wang, Quality management on amazon mechanical turk, Proceedings of the ACM SIGKDD workshop on human computation, HCOMP '10, pp.64-67, 2010.

J. Whitehill, . Ting-fan, J. Wu, J. R. Bergsma, . Movellan et al., Whose vote should count more: Optimal integration of labels from labelers of unknown expertise, Advances in neural information processing systems, pp.2035-2043, 2009.

A. González, G. Rigau, and M. Castillo, A Graph-Based Method to Improve WordNet Domains, Proceedings of the 13th International Conference on Computational Linguistics and Intelligent Text Processing, CICLing'12, pp.17-28, 2012.
DOI : 10.1007/978-3-642-28604-9_2

L. Michael, . Fredman, E. Dan, and . Willard, Trans-dichotomous algorithms for minimum spanning trees and shortest paths, Journal of Computer and System Sciences, vol.48, issue.3, pp.533-551, 1994.

Z. Wu and M. Palmer, Verbs semantics and lexical selection, Proceedings of the 32nd annual meeting on Association for Computational Linguistics -, pp.133-138, 1994.
DOI : 10.3115/981732.981751

Y. Yang, Noise reduction in a statistical approach to text categorization, Proceedings of the 18th annual international ACM SIGIR conference on Research and development in information retrieval , SIGIR '95, pp.256-263, 1995.
DOI : 10.1145/215206.215367

H. Kim, P. Howland, and H. Park, Dimension reduction in text classification with support vector machines, Journal of Machine Learning Research, vol.6, pp.37-53, 2005.

Y. Bengio, R. Ducharme, P. Vincent, and C. Jauvin, Neural Probabilistic Language Models, Journal of machine learning research, vol.3, issue.Feb, pp.1137-1155, 2003.
DOI : 10.1007/3-540-33486-6_6

URL : https://hal.archives-ouvertes.fr/hal-01434258

D. He, A. Göker, J. David, and . Harper, Combining evidence for automatic Web session identification, Information Processing & Management, vol.38, issue.5, pp.727-742, 2002.
DOI : 10.1016/S0306-4573(01)00060-7

R. Jones and K. L. Klinkner, Beyond the session timeout, Proceeding of the 17th ACM conference on Information and knowledge mining, CIKM '08, pp.699-708, 2008.
DOI : 10.1145/1458082.1458176

D. Mccoy, K. Bauer, D. Grunwald, T. Kohno, and D. Sicker, Shining Light in Dark Places: Understanding the Tor Network, Proceedings of the 8th International Symposium on Privacy Enhancing Technologies, PETS'08, pp.63-76, 2008.
DOI : 10.1007/978-3-540-70630-4_5

N. P. , P. Mavrommatis, and M. Abu-rajab-fabian-monrose, All your iframes point to us, Proceedings of the 17th Conference on Security Symposium, USENIX Security'08, pp.1-15, 2008.

A. Haeberlen, P. Kouznetsov, and P. Druschel, PeerReview, ACM SIGOPS Operating Systems Review, vol.41, issue.6, pp.175-188, 2007.
DOI : 10.1145/1323293.1294279

A. Haeberlen, P. Aditya, R. Rodrigues, and P. Druschel, Accountable virtual machines, Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, OSDI'10, pp.119-134, 2010.

. Prénoms, Albin TITRE : Introducing Privacy In Current Web Search Engines NATURE : Doctorat Numéro d'ordre, pp.2017-2033

. Dans-cette-thèse and . Simattack, une attaque contre les solutions protégeant la vie privée de l'utilisateur dans ses interactions avec les moteurs de recherche. Cette attaque vise à retrouver les requêtes initialement envoyées par l'utilisateur. Nous avons montré avec cette attaque que trois mécanismes représentatifs de l'état de l'art ne sont pas satisfaisants pour protéger la vie privée des utilisateurs

P. Par, mécanisme de protection qui améliore la protection de la vie privée de l'utilisateur. Cette solution repose sur deux types de protection : cacher l'identité de l'utilisateur (par une succession de deux serveurs) et masquer sa requête (en la combinant avec des fausses requêtes) Afin de générer des fausses requêtes réalistes

C. Claude, K. Rüdiger, K. Harald, B. Catherine, L. Mathias et al., Cette thèse est accessible à l'adresse : http://theses.insa-lyon.fr/publication, 2017016.