. Friendica, The internet is our social network

G. Ateniese, M. Steiner, and G. Tsudik, New multiparty authentication services and key agreement protocols, IEEE Journal on Selected Areas in Communications, vol.18, issue.4, pp.628-639, 2000.
DOI : 10.1109/49.839937

R. Baden, A. Bender, N. Spring, B. Bhattacharjee, and D. Starin, Persona: An online social network with user-defined privacy, ACM SIGCOMM '09

M. Bertier, D. Frey, R. Guerraoui, A. Kermarrec, and V. Leroy, The Gossple Anonymous Social Network, 2010.
DOI : 10.1007/978-3-642-16955-7_10

URL : https://hal.archives-ouvertes.fr/hal-01055283

S. Buchegger, D. Schiöberg, L. Vu, and A. Datta, PeerSoN: P2P social networking, Proceedings of the Second ACM EuroSys Workshop on Social Network Systems, SNS '09, p.9, 2009.
DOI : 10.1145/1578002.1578010

L. Cutillo, R. Molva, and T. Strufe, Safebook: Feasibility of transitive cooperation for privacy on a decentralized social network, 2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops, p.9, 2009.
DOI : 10.1109/WOWMOM.2009.5282446

URL : https://hal.archives-ouvertes.fr/hal-00687186

P. S. Dodds, R. Muhamad, and D. J. Watts, An Experimental Study of Search in Global Social Networks, Science, vol.301, issue.5634, 2003.
DOI : 10.1126/science.1081058

M. Durr, M. Maier, and F. Dorfmeister, Vegas -- A Secure and Privacy-Preserving Peer-to-Peer Online Social Network, 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing
DOI : 10.1109/SocialCom-PASSAT.2012.42

A. J. Feldman, A. Blankstein, M. J. Freedman, and E. W. Felten, Social networking with frientegrity: Privacy and integrity with an untrusted provider

K. Graffi, C. Gross, P. Mukherjee, A. Kovacevic, and R. Steinmetz, kom: A p2p-based platform for secure online social networks

S. Guha, K. Tang, and P. Francis, NOYB, Proceedings of the first workshop on Online social networks, WOSP '08
DOI : 10.1145/1397735.1397747

M. H. Gunes and C. Evrenosoglu, Blind processing: Securing data against system administrators, 2010 IEEE/IFIP Network Operations and Management Symposium Workshops, p.10
DOI : 10.1109/NOMSW.2010.5486559

H. Kardes, A. Sevincer, M. H. Gunes, and M. , Six Degrees of Separation among US Researchers, 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2012.
DOI : 10.1109/ASONAM.2012.109

P. A. Kirschner and A. C. Karpinski, Facebook?? and academic performance, Computers in Human Behavior, vol.26, issue.6, 2010.
DOI : 10.1016/j.chb.2010.03.024

B. Li, E. Erdin, M. H. Gunes, G. Bebis, and T. Shipley, An overview of anonymity technology usage, Computer Communications, vol.36, issue.12, pp.1269-1283, 2013.
DOI : 10.1016/j.comcom.2013.04.009

S. Milgram, The small world problem, Psychology today, 1967.
DOI : 10.1037/e400002009-005

H. A. Narayanan and M. H. Gunes, Ensuring access control in cloud provisioned healthcare systems, 2011 IEEE Consumer Communications and Networking Conference (CCNC), 2011.
DOI : 10.1109/CCNC.2011.5766466

J. Naruchitparames and M. H. Gunes, Enhancing data privacy and integrity in the cloud, 2011 International Conference on High Performance Computing & Simulation, 2011.
DOI : 10.1109/HPCSim.2011.5999856

J. Naruchitparames, M. H. Gunes, and S. J. Louis, Friend recommendations in social networks using genetic algorithms and network topology, 2011 IEEE Congress of Evolutionary Computation (CEC), 2011.
DOI : 10.1109/CEC.2011.5949888

R. Narendula, T. Papaioannou, and K. Aberer, My3: A highly-available p2p-based online social network. Peer-to-Peer Computing, 2011.

S. Nilizadeh, N. Alam, N. Husted, and A. Kapadia, Pythia, Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, WPES '11, p.11
DOI : 10.1145/2046556.2046562

S. Nilizadeh, S. Jahid, P. Mittal, N. Borisov, and A. Kapadia, Cachet, Proceedings of the 8th international conference on Emerging networking experiments and technologies, CoNEXT '12, p.12
DOI : 10.1145/2413176.2413215

A. Perrig, Efficient collaborative key management protocols for secure autonomous group communication

S. Rafaeli and D. Hutchison, A survey of key management for secure group communication, ACM Computing Surveys, vol.35, issue.3, pp.309-329, 2003.
DOI : 10.1145/937503.937506

A. Shakimov, H. Lim, R. Caceres, L. Cox, K. Li et al., Visa-vis: Privacy-preserving online social networking via virtual individual servers, 2011.

R. Sharma and A. Datta, SuperNova: Super-peers based architecture for decentralized online social networks, 2012 Fourth International Conference on Communication Systems and Networks (COMSNETS 2012), 2012.
DOI : 10.1109/COMSNETS.2012.6151349

A. Tootoonchian, S. Saroiu, Y. Ganjali, and A. Wolman, Lockr, Proceedings of the 5th international conference on Emerging networking experiments and technologies, CoNEXT '09
DOI : 10.1145/1658939.1658959

C. A. Yeung, I. Liccardi, K. Lu, O. Seneviratne, and T. Berners-lee, Decentralization: The future of online social networking, W3C Workshop on the Future of Social Networking Position Papers, 2009.

C. Wilson, T. Steinbauer, G. Wang, A. Sala, H. Zheng et al., Privacy, availability and economics in the Polaris mobile social network, Proceedings of the 12th Workshop on Mobile Computing Systems and Applications, HotMobile '11, p.11
DOI : 10.1145/2184489.2184499

R. E. Wilson, S. D. Gosling, and L. T. Graham, A Review of Facebook Research in the Social Sciences, Perspectives on Psychological Science, vol.14, issue.15, 2012.
DOI : 10.1016/j.jrp.2008.09.002

L. Zhang and A. Mislove, Building confederated web-based services with Priv.io, Proceedings of the first ACM conference on Online social networks, COSN '13
DOI : 10.1145/2512938.2512943