L. M. Aiello and G. Ruffo, LotusNet: Tunable privacy for distributed online social network services, Computer Communications, vol.35, issue.1, pp.75-88, 2012.
DOI : 10.1016/j.comcom.2010.12.006

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.644.8303

R. Baden, A. Bender, N. Spring, B. Bhattacharjee, and D. Starin, Persona, ACM SIGCOMM Computer Communication Review, vol.39, issue.4, pp.135-146, 2009.
DOI : 10.1145/1594977.1592585

H. Balakrishnan, M. F. Kaashoek, D. Karger, R. Morris, and I. Stoica, Looking up data in P2P systems, Communications of the ACM, vol.46, issue.2, pp.43-48, 2003.
DOI : 10.1145/606272.606299

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.9709

O. Bodriagov and S. Buchegger, Encryption for peer-to-peer social networks, 2013.
DOI : 10.1007/978-1-4614-4139-7_4

S. Buchegger, D. Schiöberg, L. H. Vu, and A. Datta, PeerSoN: P2P social networking, Proceedings of the Second ACM EuroSys Workshop on Social Network Systems, SNS '09, pp.46-52, 2009.
DOI : 10.1145/1578002.1578010

L. A. Cutillo, R. Molva, and T. Strufe, Safebook: A privacy-preserving online social network leveraging on real-life trust, IEEE Communications Magazine, vol.47, issue.12, pp.94-101, 2009.
DOI : 10.1109/MCOM.2009.5350374

URL : https://hal.archives-ouvertes.fr/hal-00687143

A. Datta, S. Buchegger, L. H. Vu, T. Strufe, and K. Rzadca, Decentralized Online Social Networks, Handbook of Social Network Technologies and Applications, pp.349-378, 2010.
DOI : 10.1007/978-1-4419-7142-5_17

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.365.2420

D. Salve, A. Dondio, M. Guidi, B. Ricci, and L. , The impact of users availability on on-line ego networks: a facebook analysis, Computer Communications, 2015.

D. Salve, A. Mori, P. Ricci, and L. , A Privacy-Aware Framework for Decentralized Online Social Networks, Database and Expert Systems Applications, pp.479-490, 2015.
DOI : 10.1007/978-3-319-22852-5_39

S. Ghosh, Distributed systems: an algorithmic approach, 2014.
DOI : 10.1201/9781420010848

K. Graffi, C. Gross, D. Stingl, D. Hartung, A. Kovacevic et al., Lifesocial . kom: A secure and p2p-based solution for online social networks, Consumer Communications and Networking Conference, pp.554-558, 2011.

P. Kumaraguru, L. Cranor, J. Lobo, and S. Calo, A survey of privacy policy languages, Workshop on Usable IT Security Management (USM 07): Proceedings of the 3rd Symposium on Usable Privacy and Security, 2007.

G. Mega, A. Montresor, and G. P. Picco, On churn and communication delays in social overlays, 2012 IEEE 12th International Conference on Peer-to-Peer Computing (P2P), pp.214-224, 2012.
DOI : 10.1109/P2P.2012.6335802

S. Nilizadeh, S. Jahid, P. Mittal, N. Borisov, and A. Kapadia, Cachet, Proceedings of the 8th international conference on Emerging networking experiments and technologies, CoNEXT '12, pp.337-348, 2012.
DOI : 10.1145/2413176.2413215

R. Sharma and A. Datta, SuperNova: Super-peers based architecture for decentralized online social networks, 2012 Fourth International Conference on Communication Systems and Networks (COMSNETS 2012), pp.1-10, 2012.
DOI : 10.1109/COMSNETS.2012.6151349