com/static?key=user_agreement. [18] Linkedin's $8b ipo - silicon valley, get ready for hous- ing recoveryipo-silicon-valley-get-ready-for-housing-recovery, 2011. ,
Free riding on Gnutella, First Monday, vol.5, issue.10, 2000. ,
DOI : 10.5210/fm.v5i10.792
Basic concepts and taxonomy of dependable and secure computing, IEEE Transactions on Dependable and Secure Computing, vol.1, issue.1, p.1133, 2004. ,
DOI : 10.1109/TDSC.2004.2
Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography, Proceedings of the 16th international conference on World Wide Web, WWW '07, p.181190, 2007. ,
Persona: An online social network with user-dened privacy, ACM SIGCOMM, 2009. ,
Abusing Social Networks for Automated User Proling, 2010. ,
Making p2p accountable without losing privacy, Proceedings of the 2007 ACM workshop on Privacy in electronic society , WPES '07, p.3140, 2007. ,
DOI : 10.1145/1314333.1314339
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.127.3247
Total recall: system support for automated availability management, Proceedings of the 1st conference on Symposium on Networked Systems Design and Implementation, p.2525, 2004. ,
All your contacts are belong to us, Proceedings of the 18th international conference on World wide web, WWW '09, p.551560, 2009. ,
DOI : 10.1145/1526709.1526784
The Privacy Jungle: On the Market for Privacy in Social Networks, Proceedings of the Eighth Workshop on the Economics of Information Security, 2009. ,
Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks, Proceedings 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing, 2002. ,
DOI : 10.1109/EMPDP.2002.994321
PeerSoN: P2P social networking, Proceedings of the Second ACM EuroSys Workshop on Social Network Systems, SNS '09, 2009. ,
DOI : 10.1145/1578002.1578010
Enforcing service availability in mobile ad-hoc WANs, 2000 First Annual Workshop on Mobile and Ad Hoc Networking and Computing. MobiHOC (Cat. No.00EX444), 2000. ,
DOI : 10.1109/MOBHOC.2000.869216
Stimulating cooperation in self-organizing mobile ad hoc networks Endorsed e-cash, Mobile Networks and Applications IEEE Symposium on Security and Privacy, SP '07, p.115, 2003. ,
Scribe: a large-scale and decentralized application-level multicast infrastructure, IEEE Journal on Selected Areas in Communications, vol.20, issue.8, p.20, 2002. ,
DOI : 10.1109/JSAC.2002.803069
Blind Signatures for Untraceable Payments, Advances in Cryptology, CRYPTO '82, 1983. ,
DOI : 10.1007/978-1-4757-0602-4_18
Blind Signature System, Advances in Cryptology, CRYPTO '83, 1984. ,
DOI : 10.1007/978-1-4684-4730-9_14
A survey of anonymous peer-to-peer le-sharing, Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing, EUC '05, p.744755, 2005. ,
Incentives Build Robustness in BitTorrent In 1st Workshop on Economics of Peer-to-Peer Systems, P2PECON '03, 2003. ,
Security and Privacy in Online Social Networks, 2010. ,
Performance and privacy tradeo in peer-to-peer on-line social networks, 2010. ,
Analysis of privacy in online social networks from the graph theory perspective, GLOBECOM 2011, Selected Areas in Communications Symposium, Social Networks Track, 2011. ,
Leveraging social links for trust and privacy in networks, INetSec 2009, Open Research Problems in Network Security, 2009. ,
Privacy preserving social networking through decentralization, WONS 2009, 6th International Conference on Wireless On-demand Network Systems and Services, 2009. ,
Safebook: a privacy preserving online social network leveraging on real-life trust, Consumer Communications and Networking Series, p.47, 2009. ,
Social network sites: Denition, history, and scholarship, Journal of Computer-Mediated Communication, vol.13, issue.1, 2007. ,
DOI : 10.1109/emr.2010.5559139
Facebook's privacy trainwreck. Convergence: The International Journal of Research into New Media Technologies, 2008. ,
A measurement of mixing time in social networks, STM 2009, 5th International Workshop on Security and Trust Management, 2009. ,
P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains, IEEE Transactions on Knowledge and Data Engineering, vol.22, issue.7, pp.1000-1013, 2010. ,
DOI : 10.1109/TKDE.2009.45
The Sybil Attack, Proceedings of the 1st International Workshop on Peer-to-Peer Systems, volume 2429 of IPTPS '02, p.251260, 2002. ,
DOI : 10.1007/3-540-45748-8_24
PAST: a large-scale, persistent peer-to-peer storage utility, Proceedings Eighth Workshop on Hot Topics in Operating Systems, p.75, 2001. ,
DOI : 10.1109/HOTOS.2001.990064
A large-scale study of web password habits, Proceedings of the 16th international conference on World Wide Web , WWW '07, p.657666, 2007. ,
DOI : 10.1145/1242572.1242661
Face recognition using sift features, 2009 16th IEEE International Conference on Image Processing (ICIP), p.3280, 2009. ,
DOI : 10.1109/ICIP.2009.5413956
The knowledge complexity of interactive proof-systems, Proceedings of the seventeenth annual ACM symposium on Theory of computing, p.291304, 1985. ,
Lifesocial.kom: A secure and p2p-based solution for online social networks, Proceedings of the IEEE Consumer Communications and Networking Conference, 2011. ,
Information revelation and privacy in online social networks, Proceedings of the 2005 ACM workshop on Privacy in the electronic society , WPES '05, p.7180, 2005. ,
DOI : 10.1145/1102199.1102214
An experimental study of the skype peerto-peer voip system, Proceedings of The 5th International Workshop on Peer-to-Peer Systems, IPTPS '06, p.16, 2006. ,
Glacier: highly durable, decentralized storage despite massive correlated failures, Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation, p.143158, 2005. ,
The s/key one-time password system, Proceedings of the Internet Society Symposium on Network and Distributed System Security, p.151157, 1994. ,
DOI : 10.17487/rfc1760
Social phishing, Communications of the ACM, vol.50, issue.10, p.94100, 2007. ,
DOI : 10.1145/1290958.1290968
Facebook: Threats to Privacy, Project MAC: MIT Project on Mathematics and Computing, 2005. ,
Using Dependency Tracking to Provide Explanations for Policy Management, 2008 IEEE Workshop on Policies for Distributed Systems and Networks, p.5461, 2008. ,
DOI : 10.1109/POLICY.2008.51
MyNet: A Platform for Secure P2P Personal and Social Networking Services, 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom), pp.135-146, 2008. ,
DOI : 10.1109/PERCOM.2008.40
Prometheus: User-Controlled P2P Social Data Management for Socially-Aware Applications, Proceedings of the ACM/IFIP/USENIX 11th International Conference on Middleware, Middleware '10, p.212231, 2010. ,
DOI : 10.1007/978-3-642-16955-7_11
URL : https://hal.archives-ouvertes.fr/hal-01055282
On the leakage of personally identiable information via online social networks, Proceedings of the 2nd ACM workshop on Online social networks, WOSN '09, p.712, 2009. ,
Password authentication with insecure communication, Communications of the ACM, vol.24, issue.11, p.770772, 1981. ,
DOI : 10.1145/358790.358797
Fake Facebook pages spin web of deceit, Nature, vol.458, issue.7242, p.1089, 2009. ,
DOI : 10.1038/news.2009.398
Maintaining replicas in unstructured P2P systems, Proceedings of the 2008 ACM CoNEXT Conference on, CONEXT '08, p.12, 2008. ,
DOI : 10.1145/1544012.1544031
Free riding in BitTorrent is cheap, Fifth Workshop on Hot Topics in Networks, 2006. ,
Random walks on graphs: A survey, Combinatorics, Paul Erdös is Eighty, p.353398, 1993. ,
Distinctive image features from scale-invariant keypoints, International Journal of Computer Vision, vol.60, issue.2, p.91110, 2004. ,
Discriminative SIFT features for face recognition, 2009 Canadian Conference on Electrical and Computer Engineering ,
DOI : 10.1109/CCECE.2009.5090085
Kademlia: A Peer-to-Peer Information System Based on the XOR Metric, Revised Papers from the First International Workshop on Peer-to-Peer Systems, IPTPS '01, p.5365, 2002. ,
DOI : 10.1007/3-540-45748-8_5
What's up: P2P spontaneous social networking, 2009 IEEE International Conference on Pervasive Computing and Communications, 2009. ,
DOI : 10.1109/PERCOM.2009.4912800
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.533.1047
Core: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks, Proceedings of IFIP Communication and Multimedia Security Conference, 2002. ,
DOI : 10.1007/978-0-387-35612-9_9
You are who you know, Proceedings of the third ACM international conference on Web search and data mining, WSDM '10, p.251260, 2010. ,
DOI : 10.1145/1718487.1718519
Probability and Computing : Randomized Algorithms and Probabilistic Analysis, 2005. ,
DOI : 10.1017/CBO9780511813603
Measuring the mixing time of social graphs, Proceedings of the 10th annual conference on Internet measurement, IMC '10, p.383389, 2010. ,
DOI : 10.1145/1879141.1879191
De-anonymizing Social Networks, 2009 30th IEEE Symposium on Security and Privacy, p.173187, 2009. ,
DOI : 10.1109/SP.2009.22
URL : http://arxiv.org/abs/0903.3276
Towards usage control models: beyond traditional access control, Proceedings of the seventh ACM symposium on Access control models and technologies , SACMAT '02, p.5764, 2002. ,
DOI : 10.1145/507711.507722
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.161.4350
Decentralizing social networking services, International Tyrrhenian Workshop on Digital Communications, ITWDC 2010, 2010. ,
Decentralized Social Networking Services, Trustworthy Internet, p.187199, 2011. ,
DOI : 10.1007/978-88-470-1818-1_14
Frvt 2006 and ice 2006 large-scale experimental results, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.32, issue.5, p.831846, 2010. ,
Do incentives build robustness in bit torrent, Proceedings of the 4th USENIX conference on Networked Systems Design and Implementation, NSDI '07, p.1, 2007. ,
Dick Epema, and Henk Sips. The bittorrent p2p le-sharing system: Measurements and analysis Peer-to-Peer Systems IV, Lecture Notes in Computer Science, vol.3640, p.205216, 2005. ,
OpenID 2.0, Proceedings of the second ACM workshop on Digital identity management , DIM '06, p.1116, 2006. ,
DOI : 10.1145/1179529.1179532
Polynomial Codes Over Certain Finite Fields, Journal of the Society for Industrial and Applied Mathematics, vol.8, issue.2, 1960. ,
DOI : 10.1137/0108018
Anonymous connections and onion routing, IEEE Journal on Selected Areas in Communications, vol.16, issue.4, pp.482-494, 1998. ,
Opendht: a public dht service and its uses, Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications, SIGCOMM '05, p.7384, 2005. ,
How to Disappear Completely: A Survey of Private Peer-to- Peer Networks, Proc. International Workshop on Sustaining Privacy in Autonomous Collaborative Environments, 2007. ,
Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems, Lecture Notes in Computer Science, vol.2218, p.329350, 2001. ,
DOI : 10.1007/3-540-45518-3_18
Reputation-Based Resource Allocation in P2P Systems of Rational Users, IEEE Transactions on Parallel and Distributed Systems, vol.21, issue.4, pp.466-479, 2010. ,
DOI : 10.1109/TPDS.2009.80
Understanding online social network usage from a network perspective, Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference, IMC '09, 2009. ,
DOI : 10.1145/1644893.1644899
Vis-à-vis: Privacy-preserving online social networking via virtual individual servers, Third International Conference on Communication Systems and Networks, COMSNETS 2011, 2011. ,
Rationality and self-interest in peer to peer networks Peer-to-Peer Systems II, Lecture Notes in Computer Science, vol.2735, p.139148, 2003. ,
Eclipse Attacks on Overlay Networks: Threats and Defenses, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications, p.112, 2006. ,
DOI : 10.1109/INFOCOM.2006.231
Faster Content Access in KAD, 2008 Eighth International Conference on Peer-to-Peer Computing, 2008. ,
DOI : 10.1109/P2P.2008.28
Understanding churn in peer-to-peer networks, Proceedings of the 6th ACM SIGCOMM on Internet measurement , IMC '06, p.189202, 2006. ,
DOI : 10.1145/1177080.1177105
Swift: A system with incentives for trading, Proceedings of Second Workshop of Economics in Peer-to-Peer Systems, 2004. ,
Lockr, Proceedings of the 5th international conference on Emerging networking experiments and technologies, CoNEXT '09, p.169180, 2009. ,
DOI : 10.1145/1658939.1658959
Face recognition with DAISY descriptors, Proceedings of the 12th ACM workshop on Multimedia and security, MM&Sec '10, p.95100, 2010. ,
DOI : 10.1145/1854229.1854249
URL : https://hal.archives-ouvertes.fr/hal-00626848
Robust real-time face detection, International Journal of Computer Vision, vol.57, issue.2, p.137154, 2004. ,
KARMA: A Secure Economic Framework for Peer-to-Peer Resource Sharing, Workshop on the Economics of Peer-to-Peer Systems, 2003. ,
CAPTCHA: Using Hard AI Problems for Security, EUROCRYPT 2003, p.294311, 2003. ,
Privacy Rights, Harward Law Review, vol.4, issue.5, p.193220, 1890. ,
DOI : 10.4135/9781412952446.n484
Design and evaluation of distributed wide-area on-line archival storage systems, p.3254129, 2006. ,
A Practical Attack to De-anonymize Social Network Users, 2010 IEEE Symposium on Security and Privacy, 2010. ,
DOI : 10.1109/SP.2010.21
Detecting faces in images: A survey, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.24, issue.1, p.3458, 2002. ,
Modeling Heterogeneous User Churn and Local Resilience of Unstructured P2P Networks, Proceedings of the 2006 IEEE International Conference on Network Protocols, p.3241, 2006. ,
DOI : 10.1109/ICNP.2006.320196
Decentralization: The Future of Online Social Networking, W3C Workshop on the Future of Social Networking, 2009. ,
Face recognition, ACM Computing Surveys, vol.35, issue.4, p.399458, 2003. ,
DOI : 10.1145/954339.954342
URL : https://hal.archives-ouvertes.fr/hal-01339319
To join or not to join, Proceedings of the 18th international conference on World wide web, WWW '09, p.531540, 2009. ,
DOI : 10.1145/1526709.1526781
Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428), 2003. ,
DOI : 10.1109/INFCOM.2003.1209220