http://tttyx2vwp7ihml3vkhywwcizv6nbwrikpgeciy3qrow7l7muak2pnhad.onion/Publications.html
This worst-case anonymity with an adversary that controls a
fraction b of the routers is comparable to the bestcase anonymity
against an adversary that controls a fraction sqrt(b). "Deploying Low-Latency Anonymity: Design Challenges and Social
Factors", IEEE Security & Privacy, September/October 2007 (Vol. 5,
No. 5), pp. 83-87. (Note: This article is a much updated and
abbreviated version of "Challenges
in deploying low-latency anonymity"