. Linkedin, com/static?key=user_agreement. [18] Linkedin's $8b ipo - silicon valley, get ready for hous- ing recoveryipo-silicon-valley-get-ready-for-housing-recovery, 2011.

E. Adar and B. A. Huberman, Free riding on Gnutella, First Monday, vol.5, issue.10, 2000.
DOI : 10.5210/fm.v5i10.792

A. Avizienis, J. Laprie, B. Randell, and C. Landwehr, Basic concepts and taxonomy of dependable and secure computing, IEEE Transactions on Dependable and Secure Computing, vol.1, issue.1, p.1133, 2004.
DOI : 10.1109/TDSC.2004.2

L. Backstrom, C. Dwork, and J. Kleinberg, Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography, Proceedings of the 16th international conference on World Wide Web, WWW '07, p.181190, 2007.

R. Baden, A. Bender, D. Starin, N. Spring, and B. Bhattacharjee, Persona: An online social network with user-dened privacy, ACM SIGCOMM, 2009.

M. Balduzzi, C. Platzer, T. Holz, E. Kirda, D. Balzarotti et al., Abusing Social Networks for Automated User Proling, 2010.

M. Belenkiy, M. Chase, C. C. Erway, J. Jannotti, A. Küpçü et al., Making p2p accountable without losing privacy, Proceedings of the 2007 ACM workshop on Privacy in electronic society , WPES '07, p.3140, 2007.
DOI : 10.1145/1314333.1314339

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.127.3247

. Voelker, Total recall: system support for automated availability management, Proceedings of the 1st conference on Symposium on Networked Systems Design and Implementation, p.2525, 2004.

L. Bilge, T. Strufe, D. Balzarotti, and E. Kirda, All your contacts are belong to us, Proceedings of the 18th international conference on World wide web, WWW '09, p.551560, 2009.
DOI : 10.1145/1526709.1526784

J. Bonneau and S. Preibusch, The Privacy Jungle: On the Market for Privacy in Social Networks, Proceedings of the Eighth Workshop on the Economics of Information Security, 2009.

S. Buchegger and J. Boudec, Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks, Proceedings 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing, 2002.
DOI : 10.1109/EMPDP.2002.994321

S. Buchegger, D. Schiöberg, L. H. Vu, and A. Datta, PeerSoN: P2P social networking, Proceedings of the Second ACM EuroSys Workshop on Social Network Systems, SNS '09, 2009.
DOI : 10.1145/1578002.1578010

L. Buttyán and J. Hubaux, Enforcing service availability in mobile ad-hoc WANs, 2000 First Annual Workshop on Mobile and Ad Hoc Networking and Computing. MobiHOC (Cat. No.00EX444), 2000.
DOI : 10.1109/MOBHOC.2000.869216

L. Buttyán, J. Hubaux, ]. J. Camenisch, A. Lysyanskaya, and M. Meyerovich, Stimulating cooperation in self-organizing mobile ad hoc networks Endorsed e-cash, Mobile Networks and Applications IEEE Symposium on Security and Privacy, SP '07, p.115, 2003.

M. Castro, P. Druschel, A. Kermarrec, and A. Rowstron, Scribe: a large-scale and decentralized application-level multicast infrastructure, IEEE Journal on Selected Areas in Communications, vol.20, issue.8, p.20, 2002.
DOI : 10.1109/JSAC.2002.803069

D. Chaum, Blind Signatures for Untraceable Payments, Advances in Cryptology, CRYPTO '82, 1983.
DOI : 10.1007/978-1-4757-0602-4_18

D. Chaum, Blind Signature System, Advances in Cryptology, CRYPTO '83, 1984.
DOI : 10.1007/978-1-4684-4730-9_14

T. Chothia and K. Chatzikokolakis, A survey of anonymous peer-to-peer le-sharing, Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing, EUC '05, p.744755, 2005.

B. Cohen, Incentives Build Robustness in BitTorrent In 1st Workshop on Economics of Peer-to-Peer Systems, P2PECON '03, 2003.

L. Antonio-cutillo, M. Manulis, and T. Strufe, Security and Privacy in Online Social Networks, 2010.

L. Antonio-cutillo, R. Molva, and M. Önen, Performance and privacy tradeo in peer-to-peer on-line social networks, 2010.

L. Antonio-cutillo, R. Molva, and M. Önen, Analysis of privacy in online social networks from the graph theory perspective, GLOBECOM 2011, Selected Areas in Communications Symposium, Social Networks Track, 2011.

L. Antonio-cutillo, R. Molva, and T. Strufe, Leveraging social links for trust and privacy in networks, INetSec 2009, Open Research Problems in Network Security, 2009.

L. Antonio-cutillo, R. Molva, and T. Strufe, Privacy preserving social networking through decentralization, WONS 2009, 6th International Conference on Wireless On-demand Network Systems and Services, 2009.

L. Antonio-cutillo, R. Molva, and T. Strufe, Safebook: a privacy preserving online social network leveraging on real-life trust, Consumer Communications and Networking Series, p.47, 2009.

N. B. Boyd and . Ellison, Social network sites: Denition, history, and scholarship, Journal of Computer-Mediated Communication, vol.13, issue.1, 2007.
DOI : 10.1109/emr.2010.5559139

. Boyd, Facebook's privacy trainwreck. Convergence: The International Journal of Research into New Media Technologies, 2008.

M. Dell-'amico and Y. Roudier, A measurement of mixing time in social networks, STM 2009, 5th International Workshop on Security and Trust Management, 2009.

P. Dewan and P. Dasgupta, P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains, IEEE Transactions on Knowledge and Data Engineering, vol.22, issue.7, pp.1000-1013, 2010.
DOI : 10.1109/TKDE.2009.45

J. Douceur, The Sybil Attack, Proceedings of the 1st International Workshop on Peer-to-Peer Systems, volume 2429 of IPTPS '02, p.251260, 2002.
DOI : 10.1007/3-540-45748-8_24

P. Druschel and A. Rowstron, PAST: a large-scale, persistent peer-to-peer storage utility, Proceedings Eighth Workshop on Hot Topics in Operating Systems, p.75, 2001.
DOI : 10.1109/HOTOS.2001.990064

D. Florencio and C. Herley, A large-scale study of web password habits, Proceedings of the 16th international conference on World Wide Web , WWW '07, p.657666, 2007.
DOI : 10.1145/1242572.1242661

C. Geng and X. Jiang, Face recognition using sift features, 2009 16th IEEE International Conference on Image Processing (ICIP), p.3280, 2009.
DOI : 10.1109/ICIP.2009.5413956

S. Goldwasser, C. Micali, and . Racko, The knowledge complexity of interactive proof-systems, Proceedings of the seventeenth annual ACM symposium on Theory of computing, p.291304, 1985.

K. Gra, C. Groÿ, D. Stingl, D. Hartung, A. Kovacevic et al., Lifesocial.kom: A secure and p2p-based solution for online social networks, Proceedings of the IEEE Consumer Communications and Networking Conference, 2011.

R. Gross and A. Acquisti, Information revelation and privacy in online social networks, Proceedings of the 2005 ACM workshop on Privacy in the electronic society , WPES '05, p.7180, 2005.
DOI : 10.1145/1102199.1102214

S. Guha, N. Daswani, and R. Jain, An experimental study of the skype peerto-peer voip system, Proceedings of The 5th International Workshop on Peer-to-Peer Systems, IPTPS '06, p.16, 2006.

A. Haeberlen, A. Mislove, and P. Druschel, Glacier: highly durable, decentralized storage despite massive correlated failures, Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation, p.143158, 2005.

N. Haller, The s/key one-time password system, Proceedings of the Internet Society Symposium on Network and Distributed System Security, p.151157, 1994.
DOI : 10.17487/rfc1760

T. N. Jagatic, N. A. Johnson, M. Jakobsson, and F. Menczer, Social phishing, Communications of the ACM, vol.50, issue.10, p.94100, 2007.
DOI : 10.1145/1290958.1290968

H. Jones and J. H. Soltren, Facebook: Threats to Privacy, Project MAC: MIT Project on Mathematics and Computing, 2005.

L. Kagal, C. Hanson, and D. Weitzner, Using Dependency Tracking to Provide Explanations for Policy Management, 2008 IEEE Workshop on Policies for Distributed Systems and Networks, p.5461, 2008.
DOI : 10.1109/POLICY.2008.51

D. N. Kalofonos, Z. Antoniou, F. D. Reynolds, M. Van-kleek, J. Strauss et al., MyNet: A Platform for Secure P2P Personal and Social Networking Services, 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom), pp.135-146, 2008.
DOI : 10.1109/PERCOM.2008.40

N. Kourtellis, J. Finnis, P. Anderson, J. Blackburn, C. Borcea et al., Prometheus: User-Controlled P2P Social Data Management for Socially-Aware Applications, Proceedings of the ACM/IFIP/USENIX 11th International Conference on Middleware, Middleware '10, p.212231, 2010.
DOI : 10.1007/978-3-642-16955-7_11

URL : https://hal.archives-ouvertes.fr/hal-01055282

B. Krishnamurthy and C. E. Wills, On the leakage of personally identiable information via online social networks, Proceedings of the 2nd ACM workshop on Online social networks, WOSN '09, p.712, 2009.

L. Lamport, Password authentication with insecure communication, Communications of the ACM, vol.24, issue.11, p.770772, 1981.
DOI : 10.1145/358790.358797

L. Laursen, Fake Facebook pages spin web of deceit, Nature, vol.458, issue.7242, p.1089, 2009.
DOI : 10.1038/news.2009.398

C. Leng, W. W. Terpstra, B. Kemme, W. Stannat, and A. P. Buchmann, Maintaining replicas in unstructured P2P systems, Proceedings of the 2008 ACM CoNEXT Conference on, CONEXT '08, p.12, 2008.
DOI : 10.1145/1544012.1544031

T. Locher, P. Moor, S. Schmid, and R. Wattenhofer, Free riding in BitTorrent is cheap, Fifth Workshop on Hot Topics in Networks, 2006.

L. Lovász, Random walks on graphs: A survey, Combinatorics, Paul Erdös is Eighty, p.353398, 1993.

G. David and . Lowe, Distinctive image features from scale-invariant keypoints, International Journal of Computer Vision, vol.60, issue.2, p.91110, 2004.

A. Majumdar and R. K. Ward, Discriminative SIFT features for face recognition, 2009 Canadian Conference on Electrical and Computer Engineering
DOI : 10.1109/CCECE.2009.5090085

P. Maymounkov and D. Mazières, Kademlia: A Peer-to-Peer Information System Based on the XOR Metric, Revised Papers from the First International Workshop on Peer-to-Peer Systems, IPTPS '01, p.5365, 2002.
DOI : 10.1007/3-540-45748-8_5

A. Mani and N. Crespi, What's up: P2P spontaneous social networking, 2009 IEEE International Conference on Pervasive Computing and Communications, 2009.
DOI : 10.1109/PERCOM.2009.4912800

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.533.1047

P. Michiardi and R. Molva, Core: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks, Proceedings of IFIP Communication and Multimedia Security Conference, 2002.
DOI : 10.1007/978-0-387-35612-9_9

A. Mislove, B. Viswanath, K. P. Gummadi, and P. Druschel, You are who you know, Proceedings of the third ACM international conference on Web search and data mining, WSDM '10, p.251260, 2010.
DOI : 10.1145/1718487.1718519

M. Mitzenmacher and E. Upfal, Probability and Computing : Randomized Algorithms and Probabilistic Analysis, 2005.
DOI : 10.1017/CBO9780511813603

A. Mohaisen, A. Yun, and Y. Kim, Measuring the mixing time of social graphs, Proceedings of the 10th annual conference on Internet measurement, IMC '10, p.383389, 2010.
DOI : 10.1145/1879141.1879191

A. Narayanan and V. Shmatikov, De-anonymizing Social Networks, 2009 30th IEEE Symposium on Security and Privacy, p.173187, 2009.
DOI : 10.1109/SP.2009.22

URL : http://arxiv.org/abs/0903.3276

J. Park and R. Sandhu, Towards usage control models: beyond traditional access control, Proceedings of the seventh ACM symposium on Access control models and technologies , SACMAT '02, p.5764, 2002.
DOI : 10.1145/507711.507722

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.161.4350

T. Paul, S. Buchegger, and T. Strufe, Decentralizing social networking services, International Tyrrhenian Workshop on Digital Communications, ITWDC 2010, 2010.

T. Paul, S. Buchegger, and T. Strufe, Decentralized Social Networking Services, Trustworthy Internet, p.187199, 2011.
DOI : 10.1007/978-88-470-1818-1_14

C. L. Bowyer, M. Schott, and . Sharpe, Frvt 2006 and ice 2006 large-scale experimental results, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.32, issue.5, p.831846, 2010.

M. Piatek, T. Isdal, T. Anderson, A. Krishnamurthy, and A. Venkataramani, Do incentives build robustness in bit torrent, Proceedings of the 4th USENIX conference on Networked Systems Design and Implementation, NSDI '07, p.1, 2007.

J. Pouwelse and P. Garbacki, Dick Epema, and Henk Sips. The bittorrent p2p le-sharing system: Measurements and analysis Peer-to-Peer Systems IV, Lecture Notes in Computer Science, vol.3640, p.205216, 2005.

D. Recordon and D. Reed, OpenID 2.0, Proceedings of the second ACM workshop on Digital identity management , DIM '06, p.1116, 2006.
DOI : 10.1145/1179529.1179532

I. S. Reed and G. Solomon, Polynomial Codes Over Certain Finite Fields, Journal of the Society for Industrial and Applied Mathematics, vol.8, issue.2, 1960.
DOI : 10.1137/0108018

G. Michael, P. F. Reed, D. M. Syverson, and . Goldschlag, Anonymous connections and onion routing, IEEE Journal on Selected Areas in Communications, vol.16, issue.4, pp.482-494, 1998.

S. Rhea, B. Godfrey, B. Karp, J. Kubiatowicz, S. Ratnasamy et al., Opendht: a public dht service and its uses, Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications, SIGCOMM '05, p.7384, 2005.

M. Rogers and S. Bhatti, How to Disappear Completely: A Survey of Private Peer-to- Peer Networks, Proc. International Workshop on Sustaining Privacy in Autonomous Collaborative Environments, 2007.

A. Rowstron and P. Druschel, Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems, Lecture Notes in Computer Science, vol.2218, p.329350, 2001.
DOI : 10.1007/3-540-45518-3_18

A. Satsiou and L. Tassiulas, Reputation-Based Resource Allocation in P2P Systems of Rational Users, IEEE Transactions on Parallel and Distributed Systems, vol.21, issue.4, pp.466-479, 2010.
DOI : 10.1109/TPDS.2009.80

F. Schneider, A. Feldmann, B. Krishnamurthy, and W. Willinger, Understanding online social network usage from a network perspective, Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference, IMC '09, 2009.
DOI : 10.1145/1644893.1644899

A. Shakimov, H. Lim, R. Cáceres, L. Cox, K. Li et al., Vis-à-vis: Privacy-preserving online social networking via virtual individual servers, Third International Conference on Communication Systems and Networks, COMSNETS 2011, 2011.

J. Shneidman and D. Parkes, Rationality and self-interest in peer to peer networks Peer-to-Peer Systems II, Lecture Notes in Computer Science, vol.2735, p.139148, 2003.

A. Singh, T. Ngan, P. Druschel, and D. S. Wallach, Eclipse Attacks on Overlay Networks: Threats and Defenses, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications, p.112, 2006.
DOI : 10.1109/INFOCOM.2006.231

M. Steiner, D. Carra, and E. W. Biersack, Faster Content Access in KAD, 2008 Eighth International Conference on Peer-to-Peer Computing, 2008.
DOI : 10.1109/P2P.2008.28

D. Stutzbach and R. Rejaie, Understanding churn in peer-to-peer networks, Proceedings of the 6th ACM SIGCOMM on Internet measurement , IMC '06, p.189202, 2006.
DOI : 10.1145/1177080.1177105

K. Tamilman, V. Pai, and A. Mohr, Swift: A system with incentives for trading, Proceedings of Second Workshop of Economics in Peer-to-Peer Systems, 2004.

A. Tootoonchian, S. Saroiu, Y. Ganjali, and A. Wolman, Lockr, Proceedings of the 5th international conference on Emerging networking experiments and technologies, CoNEXT '09, p.169180, 2009.
DOI : 10.1145/1658939.1658959

C. Velardo and J. Dugelay, Face recognition with DAISY descriptors, Proceedings of the 12th ACM workshop on Multimedia and security, MM&Sec '10, p.95100, 2010.
DOI : 10.1145/1854229.1854249

URL : https://hal.archives-ouvertes.fr/hal-00626848

P. Viola and M. J. Jones, Robust real-time face detection, International Journal of Computer Vision, vol.57, issue.2, p.137154, 2004.

V. Vishnumurthy, S. Chandrakumar, and E. Sirer, KARMA: A Secure Economic Framework for Peer-to-Peer Resource Sharing, Workshop on the Economics of Peer-to-Peer Systems, 2003.

M. Luis-von-ahn, N. J. Blum, J. Hopper, and . Langford, CAPTCHA: Using Hard AI Problems for Security, EUROCRYPT 2003, p.294311, 2003.

D. Samuel, L. D. Warren, and . Brandeis, Privacy Rights, Harward Law Review, vol.4, issue.5, p.193220, 1890.
DOI : 10.4135/9781412952446.n484

H. Weatherspoon, Design and evaluation of distributed wide-area on-line archival storage systems, p.3254129, 2006.

G. Wondracek, T. Holz, E. Kirda, and C. Kruegel, A Practical Attack to De-anonymize Social Network Users, 2010 IEEE Symposium on Security and Privacy, 2010.
DOI : 10.1109/SP.2010.21

M. Yang, D. J. Kriegman, and N. Ahuja, Detecting faces in images: A survey, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.24, issue.1, p.3458, 2002.

Z. Yao, D. Leonard, X. Wang, and D. Loguinov, Modeling Heterogeneous User Churn and Local Resilience of Unstructured P2P Networks, Proceedings of the 2006 IEEE International Conference on Network Protocols, p.3241, 2006.
DOI : 10.1109/ICNP.2006.320196

C. M. , A. Yeung, I. Liccardi, K. Lu, O. Seneviratne et al., Decentralization: The Future of Online Social Networking, W3C Workshop on the Future of Social Networking, 2009.

W. Zhao, R. Chellappa, P. J. Phillips, and A. Rosenfeld, Face recognition, ACM Computing Surveys, vol.35, issue.4, p.399458, 2003.
DOI : 10.1145/954339.954342

URL : https://hal.archives-ouvertes.fr/hal-01339319

E. Zheleva and L. Getoor, To join or not to join, Proceedings of the 18th international conference on World wide web, WWW '09, p.531540, 2009.
DOI : 10.1145/1526709.1526781

S. Zhong, J. Chen, and Y. R. Yang, Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428), 2003.
DOI : 10.1109/INFCOM.2003.1209220