Edman and Yener provide in this paper a complete and clear survey of anonymity. They start by defining terms, to unify the terminologies. Some taxonomies found in the paper would allow researchers and developers to classify and define points to investigate and to better apply the techniques used.
The authors cover all topics related to the field: the taxonomies and terminologies mentioned above; mix and mixes networks; the flush algorithm, with a description of its operations and some critical comments; traffic analysis attacks; and future investigation in the field. The comments are of interest because they will help a developer choose the right solution. The coverage of the topics is quite complete--the paper provides a description, accompanied by a critical analysis of the implemented system. Edman and Yener also provide a critical overview of traffic analysis attacks.
In conclusion, this paper should be of interest to researchers who need to know what anonymity is, its variants, what traffic analysis methods can best be used, and the details about the concepts associated with anonymity.