R. Baden, A. Bender, D. Starin, N. Spring, and B. Bhattacharjee, Persona: An online social network with user-defined privacy, ACM SIGCOMM, 2009.

K. Bennett and C. Grotho, gap ??? Practical Anonymous Networking, Privacy Enhancing Technologies, pp.141-160, 2003.
DOI : 10.1007/978-3-540-40956-4_10

L. Bilge, T. Strufe, D. Balzarotti, and E. Kirda, All your contacts are belong to us, Proceedings of the 18th international conference on World wide web, WWW '09, 2009.
DOI : 10.1145/1526709.1526784

S. Buchegger, D. Schiöberg, L. H. Vu, and A. Datta, PeerSoN: P2P social networking, Proceedings of the Second ACM EuroSys Workshop on Social Network Systems, SNS '09, 2009.
DOI : 10.1145/1578002.1578010

I. Clarke, O. Sandberg, B. Wiley, and T. W. Hong, Freenet: A Distributed Anonymous Information Storage and Retrieval System, Design Issues in Anonymity and Unobservability, pp.46-66, 2000.
DOI : 10.1007/3-540-44702-4_4

L. Cutillo, R. Molva, and T. Strufe, Privacy preserving social networking through decentralization, 2009 Sixth International Conference on Wireless On-Demand Network Systems and Services, 2009.
DOI : 10.1109/WONS.2009.4801860

URL : https://hal.archives-ouvertes.fr/hal-00687205

L. A. Cutillo, R. Molva, and T. Strufe, Safebook: A privacy-preserving online social network leveraging on real-life trust, IEEE Communications Magazine, vol.47, issue.12, 2009.
DOI : 10.1109/MCOM.2009.5350374

URL : https://hal.archives-ouvertes.fr/hal-00687143

L. Cutillo, R. Molva, and T. Strufe, Safebook: Feasibility of transitive cooperation for privacy on a decentralized social network, 2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops, 2009.
DOI : 10.1109/WOWMOM.2009.5282446

URL : https://hal.archives-ouvertes.fr/hal-00687186

S. Guha, N. Daswani, and R. Jain, An Experimental Study of the Skype Peer-to- Peer VoIP System, Peer-to-Peer Systems

S. Guha, K. Tang, and P. Francis, NOYB, Proceedings of the first workshop on Online social networks, WOSP '08, pp.49-54, 2008.
DOI : 10.1145/1397735.1397747

T. N. Jagatic, N. A. Johnson, M. Jakobsson, and F. Menczer, Social phishing, Communications of the ACM, vol.50, issue.10, pp.94-100, 2007.
DOI : 10.1145/1290958.1290968

P. Maymounkov and D. Mazieres, Kademlia: A Peer-to-Peer Information System Based on the XOR Metric, LNCS: P2P-Systems, 2002.
DOI : 10.1007/3-540-45748-8_5

S. Moyer and N. Hamiel, Satan is on My Friends List, 2008.

M. Rogers and S. Bhatti, How to Disappear Completely: A Survey of Private Peer-to-Peer Networks, 2007.

M. Steiner, D. Carra, and E. W. Biersack, Faster content access in KAD. In Peer-to-Peer Computing, 2008.

C. M. Yeung, I. Liccardi, K. Lu, O. Seneviratne, and T. Berners-lee, Decentralization: The Future of Online Social Networking, Future of Social Networking, 2009.