S. Amer-yahia, M. Benedikt, L. V. Lakshmanan, and J. Stoyanovich, Efficient Network Aware Search in Collaborative Tagging Sites, 2008.

X. Bai, M. Bertier, R. Guerraoui, A. M. Kermarrec, and V. Leroy, Gossiping personalized queries, Proceedings of the 13th International Conference on Extending Database Technology, EDBT '10, pp.22-26, 2010.
DOI : 10.1145/1739041.1739055

URL : https://hal.archives-ouvertes.fr/inria-00455643

M. Barbaro and T. Zeller, A face is exposed for AOL searcher No. 4417749, New York Times, 2006.

M. Bertier, D. Frey, R. Guerraoui, A. M. Kermarrec, and V. Leroy, The Gossple Anonymous Social Network, 2010.
DOI : 10.1007/978-3-642-16955-7_10

URL : https://hal.archives-ouvertes.fr/hal-01055283

D. Chaum, Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms, 1982.
DOI : 10.1007/978-1-4615-0239-5_14

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.128.8210

R. Cramer, I. Damgård, and J. B. Nielsen, Multiparty Computation from Threshold Homomorphic Encryption, EUROCRYPT'01, 2001.
DOI : 10.1007/3-540-44987-6_18

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.108.5028

I. Damgård and M. Jurik, A Generalisation, a Simplification and some Applications of Paillier???s Probabilistic Public-Key System, PKC'01, pp.13-15, 2001.
DOI : 10.7146/brics.v7i45.20212

R. Dingledine, N. Mathewson, and P. F. Syverson, Tor: The Second-Generation Onion Router, Proceedings of the 13th USENIX Security Symposium, pp.9-13, 2004.

C. Dwork, Differential Privacy: A Survey of Results, TAMC'08. Xi'an, 2008.
DOI : 10.1007/978-3-540-79228-4_1

C. Dwork, K. Kenthapadi, F. Mcsherry, I. Mironov, and M. Naor, Our Data, Ourselves: Privacy Via Distributed Noise Generation, EUROCRYPT'06. St, 2006.
DOI : 10.1007/11761679_29

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.140.3527

C. Dwork, F. Mcsherry, K. Nissim, and . Smith, Calibrating Noise to Sensitivity in Private Data Analysis, TCC'06, 2006.
DOI : 10.1007/11681878_14

B. Goethals, S. Laur, H. Lipmaa, and T. Mielikäinen, On Private Scalar Product Computation for Privacy-Preserving Data Mining, 2004.
DOI : 10.1007/11496618_9

O. Goldreich, Foundations of Cryptography, 2001.

W. L. Harkness, Properties of the Extended Hypergeometric Distribution. The Annals of, Mathematical Statistics, vol.36, issue.3, 1965.

P. Jaccard, ´ Etude Comparative de la Distribution Florale dans une Portion des Alpes et des Jura, Bulletin de la Société Vaudoise des Sciences Naturelles, vol.37, issue.142, 1901.

M. Jelasity, S. Voulgaris, R. Guerraoui, A. M. Kermarrec, and M. Van-steen, Gossip-based peer sampling, ACM Transactions on Computer Systems, vol.25, issue.3, p.25, 2007.
DOI : 10.1145/1275517.1275520

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.310.501

S. P. Kasiviswanathan, H. K. Lee, K. Nissim, S. Raskhodnikova, and . Smith, What Can We Learn Privately? In: FOCS'08, 2008.

L. Kissner and D. X. Song, Privacy-Preserving Set Operations, CRYPTO'05, 2005.
DOI : 10.1007/11535218_15

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.116.2481

F. Mcsherry and I. Mironov, Differentially private recommender systems, Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '09, 2009.
DOI : 10.1145/1557019.1557090

A. Narayanan and V. Shmatikov, Robust De-anonymization of Large Sparse Datasets, 2008 IEEE Symposium on Security and Privacy (sp 2008), 2008.
DOI : 10.1109/SP.2008.33

A. Narayanan and V. Shmatikov, De-anonymizing Social Networks, 2009 30th IEEE Symposium on Security and Privacy, 2009.
DOI : 10.1109/SP.2009.22

T. Nishide and K. Ohta, Multiparty Computation for Interval, Equality, and Comparison Without Bit-Decomposition Protocol, PKC'07, 2007.
DOI : 10.1007/978-3-540-71677-8_23

T. Nishide and K. Sakurai, Distributed Paillier Cryptosystem without Trusted Dealer, Jeju Island, 2010.
DOI : 10.1007/978-3-642-17955-6_4

P. Paillier, Public-Key Cryptosystems Based on Composite Degree Residuosity Classes, 1999.
DOI : 10.1007/3-540-48910-X_16

M. K. Reiter and A. D. Rubin, Crowds: anonymity for Web transactions, TISSEC'98, 1998.
DOI : 10.1145/290163.290168

M. Shaneck, Y. Kim, and V. Kumar, Privacy Preserving Nearest Neighbor Search, 2006.

R. N. Wright and Z. Yang, Privacy-preserving Bayesian network structure computation on distributed heterogeneous data, Proceedings of the 2004 ACM SIGKDD international conference on Knowledge discovery and data mining , KDD '04, pp.22-25, 2004.
DOI : 10.1145/1014052.1014145

D. Yao, R. Tamassia, and S. Proctor, Private Distributed Scalar Product Protocol With Application To Privacy-Preserving Computation of Trust, IFIPTM'07, 2007.
DOI : 10.1007/978-0-387-73655-6_1