Reputation Systems for Anonymous Networks, Proceedings of the 8th International Symposium on Privacy Enhancing Technologies, PETS '08, pp.202-218, 2008. ,
DOI : 10.1007/978-3-540-70630-4_13
Privacy-enabling social networking over untrusted networks, Proceedings of the 2nd ACM workshop on Online social networks, WOSN '09, pp.1-6, 2009. ,
DOI : 10.1145/1592665.1592667
LotusNet: Tunable privacy for distributed online social network services, Computer Communications, vol.35, issue.1, pp.75-88, 2012. ,
DOI : 10.1016/j.comcom.2010.12.006
Persona: An Online Social Network with User-defined Privacy, Proceedings of the ACM SIGCOMM 2009 Conference on Data Communication , SIGCOMM '09, pp.135-146, 2009. ,
Access control in decentralized online social networks: Applying a policy-hiding cryptographic scheme and evaluating its performance, 2014 IEEE International Conference on Pervasive Computing and Communication Workshops (PERCOM WORKSHOPS), pp.622-628, 2014. ,
DOI : 10.1109/PerComW.2014.6815278
PeerSoN: P2P social networking, Proceedings of the Second ACM EuroSys Workshop on Social Network Systems, SNS '09, pp.46-52, 2009. ,
DOI : 10.1145/1578002.1578010
Ciphertext-Policy Attribute-Based Encryption, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.321-334, 2007. ,
DOI : 10.1109/SP.2007.11
Secure routing for structured peer-to-peer overlay networks, ACM SIGOPS Operating Systems Review, vol.36, issue.SI, pp.299-314, 2002. ,
DOI : 10.1145/844128.844156
Safebook: A privacy-preserving online social network leveraging on real-life trust Freenet: A Distributed Anonymous Information Storage and Retrieval System, International Workshop on Designing Privacy Enhancing Technologies: Design Issues in Anonymity and Unobservability, pp.4794-101, 2001. ,
Tor: The second-generation onion router, Proceedings of the 13th USENIX Security Symposium, 2008. ,
DOI : 10.21236/ADA465464
Cryptographic Treatment of Private User Profiles, Proceedings of the 2011 International Conference on Financial Cryptography and Data Security, pp.40-54, 2012. ,
DOI : 10.1007/978-3-642-29889-9_5
Analysis of data availability in F2F storage systems: When correlations matter, 2012 IEEE 12th International Conference on Peer-to-Peer Computing (P2P), pp.225-236, 2012. ,
DOI : 10.1109/P2P.2012.6335803
Distributed Caching over Heterogeneous Mobile Networks, Proceedings of the ACM SIG- METRICS International Conference on Measurement and Modeling of Computer Systems, SIGMETRICS '10, pp.311-322, 2010. ,
Privacy-preserving P2p Data Sharing with OneSwarm, Proceedings of the ACM SIGCOMM 2010 Conference, SIGCOMM '10, pp.111-122, 2010. ,
Handbook of Peer-to- Peer Networking ,
DECENT: A decentralized architecture for enforcing privacy in online social networks, 2012 IEEE International Conference on Pervasive Computing and Communications Workshops, pp.326-332, 2012. ,
DOI : 10.1109/PerComW.2012.6197504
Predicate Encryption Supporting Disjunctions, Polynomial Equations , and Inner Products, Proceedings of the Theory and Applications of Cryptographic Techniques 27th Annual International Conference on Advances in Cryptology , EUROCRYPT'08, pp.146-162, 2008. ,
On reusing ephemeral keys in Diffie-Hellman key agreement protocols, International Journal of Applied Cryptography, vol.2, issue.2, pp.154-158, 2010. ,
DOI : 10.1504/IJACT.2010.038308
Pythia, Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, WPES '11, pp.43-48, 2011. ,
DOI : 10.1145/2046556.2046562
Cachet: A Decentralized Architecture for Privacy Preserving Social Networking with Caching, Proceedings of the 8th International Conference on Emerging Networking Experiments and Technologies, CoNEXT '12, pp.337-348, 2012. ,
Safe and private data sharing with turtle: Friends team-up and beat the system. Lectures notes in computer science, 2004. ,
Dissemination in opportunistic social networks, Proceedings of the thirteenth ACM international symposium on Mobile Ad Hoc Networking and Computing, MobiHoc '12, pp.165-174 ,
DOI : 10.1145/2248371.2248396
An empirical study of availability in friend-to-friend storage systems, 2011 IEEE International Conference on Peer-to-Peer Computing, pp.348-351, 2011. ,
DOI : 10.1109/P2P.2011.6038754
Analysis of Implementations to Secure Git for Use As an Encrypted Distributed Version Control System, Proceedings of the 2015 48th Hawaii International Conference on System Sciences, HICSS '15, pp.5310-5319, 2015. ,
The retroshare Project https://retroshare, p.2017 ,
Distributed Cooperative Caching in Social Wireless Networks, IEEE Transactions on Mobile Computing, vol.12, issue.6, pp.1037-1053, 2013. ,
Design of a Social Messaging System Using Stateful Multicast ,
Design and Analysis of an Efficient Friend-to-Friend Content Dissemination System, IEEE Transactions on Mobile Computing, vol.16, issue.3, pp.702-715, 2017. ,
DOI : 10.1109/TMC.2016.2570747
URL : https://hal.archives-ouvertes.fr/hal-01369954
A Secure and Resilient Communication Infrastructure for Decentralized Networking Applications ,
Tahoe: The Least-authority Filesystem, Proceedings of the 4th ACM International Workshop on Storage Security and Survivability, StorageSS '08, pp.21-26, 2008. ,
I2p data communication system, Proceedings of ICN 2011 The Tenth International Conference on Networks, 2011. ,
A Survey of Socially Aware Peer-to-Peer Systems, ACM Computing Surveys, vol.49, issue.1, pp.1-928, 2016. ,
DOI : 10.1016/j.comcom.2015.07.013
Inovallée 655 avenue de l'Europe Montbonnot 38334 Saint Ismier Cedex Publisher Inria Domaine de Voluceau -Rocquencourt BP 105 -78153 Le Chesnay Cedex inria, pp.249-6399 ,