B. Al-ani, G. Mark, J. Chung, and J. Jones, The Egyptian blogosphere, Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work, CSCW '12, pp.17-26, 2012.
DOI : 10.1145/2145204.2145213

P. Alves and P. Ferreira, AnonyLikes: Anonymous Quantitative Feedback on Social Networks, Middleware, pp.466-484, 2013.
DOI : 10.1007/978-3-642-45065-5_24

URL : https://hal.archives-ouvertes.fr/hal-01480788

K. Athreya and P. Ney, Branching processes, 2004.
DOI : 10.1007/978-3-642-65371-1

L. Backstrom, C. Dwork, and J. Kleinberg, Wherefore art thou r3579x?: Anonymized social networks, hidden patterns, and structural steganography, WWW, pp.181-190, 2007.

C. Ding, Y. Chen, and X. Fu, Crowd crawling, Proceedings of the first ACM conference on Online social networks, COSN '13, pp.183-188, 2013.
DOI : 10.1145/2512938.2512958

C. Dwork, Differential Privacy: A Survey of Results, TAMC, pp.1-19, 2008.
DOI : 10.1007/978-3-540-79228-4_1

C. Dwyer, S. R. Hiltz, and K. Passerini, Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace, AMCIS, p.339, 2007.

P. Haccou, P. Jagers, and V. A. Vatutin, Branching processes: Variation, growth, and extinction of populations, 2005.
DOI : 10.1017/CBO9780511629136

M. Hay, G. Miklau, D. Jensen, D. Towsley, and P. Weis, Resisting structural re-identification in anonymized social networks, PVLDB, vol.1, issue.1, pp.102-114, 2008.

S. P. Kasiviswanathan, K. Nissim, S. Raskhodnikova, and A. Smith, Analyzing Graphs with Node Differential Privacy, TTC, pp.457-476, 2013.
DOI : 10.1007/978-3-642-36594-2_26

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.296.5204

D. Kifer and A. Machanavajjhala, No free lunch in data privacy, Proceedings of the 2011 international conference on Management of data, SIGMOD '11, pp.193-204, 2011.
DOI : 10.1145/1989323.1989345

A. Korolova, R. Motwani, S. U. Nabar, and Y. Xu, Link privacy in social networks, CIKM, pp.289-298, 2008.

B. Krishnamurthy and C. E. Wills, Characterizing privacy in online social networks, Proceedings of the first workshop on Online social networks, WOSP '08, pp.37-42, 2008.
DOI : 10.1145/1397735.1397744

H. Kwak, C. Lee, H. Park, and S. Moon, What is Twitter, a social network or a news media? In WWW, pp.591-600, 2010.

G. Lotan, E. Graeff, M. Ananny, D. Gaffney, I. Pearce et al., The revolutions were tweeted: Information flows during the 2011 Tunisian and Egyptian revolutions, IJoC, vol.5, pp.1375-1405, 2011.

A. Narayanan and V. Shmatikov, De-anonymizing Social Networks, 2009 30th IEEE Symposium on Security and Privacy, pp.173-187, 2009.
DOI : 10.1109/SP.2009.22

URL : http://arxiv.org/abs/0903.3276

O. Olaore, Politexting: Using mobile technology to connect the unconnected and expanding the scope of political communication, pp.1-8, 2011.

C. Task and C. Clifton, A Guide to Differential Privacy Theory in Social Network Analysis, 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, pp.411-417, 2012.
DOI : 10.1109/ASONAM.2012.73

A. Tootoonchian, S. Saroiu, Y. Ganjali, and A. Wolman, Lockr, Proceedings of the 5th international conference on Emerging networking experiments and technologies, CoNEXT '09, pp.169-180, 2009.
DOI : 10.1145/1658939.1658959

J. R. Ullmann, An Algorithm for Subgraph Isomorphism, Journal of the ACM, vol.23, issue.1, pp.31-42, 1976.
DOI : 10.1145/321921.321925

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.361.7741

C. Wilson, B. Boe, A. Sala, K. P. Puttaswamy, and B. Y. Zhao, User interactions in social networks and their implications, Proceedings of the fourth ACM european conference on Computer systems, EuroSys '09, pp.205-218, 2009.
DOI : 10.1145/1519065.1519089

E. Zheleva and L. Getoor, Privacy in Social Networks: A Survey, Social Network Data Analytics, pp.277-306, 2011.
DOI : 10.1007/978-1-4419-8462-3_10

B. Zhou and J. Pei, Preserving Privacy in Social Networks Against Neighborhood Attacks, 2008 IEEE 24th International Conference on Data Engineering, pp.506-515, 2008.
DOI : 10.1109/ICDE.2008.4497459

B. Zhou and J. Pei, The k-anonymity and l-diversity approaches for privacy preservation in social networks against neighborhood attacks, Knowledge and Information Systems, vol.2, issue.1, pp.47-77, 2011.
DOI : 10.1007/s10115-010-0311-2