M. Akhoondi, C. Yu, H. V. Madhyastha, D. Alhadidi, N. Mohammed et al., LASTor: A low-latency as-aware tor client Secure distributed framework for achieving differential privacy Enhancing Tor's performance using real-time traffic classification DefenestraTor: Throwing Out Windows in Tor Seti@ home: an experiment in publicresource computing, 17th USENIX Security Symposium IEEE Symposium on Security and Privacy 12th Privacy Enhancing Technologies Symposium 19th ACM Conference on Computer and Communications Security 11th Privacy Enhancing Technologies Symposium, 2011. [6] A&M Records, Inc. v. Napster, Inc., 239 F.3d 1004 Pragocrypt, 1996. [9] P. S. Andre. IETF RFC 6120 Extensible Messaging and Presence Protocol (xmpp): Core. https, pp.56-61, 2001.

M. Andrychowicz, S. Dziembowski, D. Malinowski, and L. Mazurek, Secure multiparty computations on Bitcoin, IEEE Symposium on Security and Privacy, 2014.
DOI : 10.1145/2896386

URL : https://eprint.iacr.org/2013/784.pdf

M. S. Artigas and P. G. López, On routing in Distributed Hash Tables: Is reputation a shelter from malicious behavior and churn?, 9th IEEE Conference on Peer-to-Peer Computing, pp.31-40, 2009.

M. Backes, A. Kate, S. Meiser, and E. Mohammadi, (Nothing else) MATor(s), Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, 2014.
DOI : 10.1007/978-3-642-32946-3_9

P. Baran, On distributed communications. Volumes I-XI, RAND Corporation Research Documents, 1964.

K. S. Bauer, D. Mccoy, D. Grunwald, T. Kohno, and D. C. Sicker, Low-resource routing attacks against tor, Proceedings of the 2007 ACM workshop on Privacy in electronic society , WPES '07, 2007.
DOI : 10.1145/1314333.1314336

URL : http://www.freehaven.net/anonbib/cache/bauer:wpes2007.pdf

L. Bauer, S. Garriss, and M. K. Reiter, Distributed Proving in Access-Control Systems, 2005 IEEE Symposium on Security and Privacy (S&P'05), 2005.
DOI : 10.1109/SP.2005.9

URL : http://www.cs.unc.edu/~reiter/papers/2005/SP2.pdf

M. Belenkiy, J. Camenisch, M. Chase, M. Kohlweiss, A. Lysyanskaya et al., Randomizable Proofs and Delegatable Anonymous Credentials, 29th International Cryptology Conference Advances in Cryptology, 2009.
DOI : 10.1007/978-3-642-03356-8_7

URL : http://eprint.iacr.org/2008/428.pdf

M. Belenkiy, M. Chase, C. C. Erway, J. Jannotti, A. Küpçü et al., Making p2p accountable without losing privacy, Proceedings of the 2007 ACM workshop on Privacy in electronic society , WPES '07, 2007.
DOI : 10.1145/1314333.1314339

URL : http://www.cs.brown.edu/~mira/papers/wpes07.pdf

E. Ben-sasson, A. Chiesa, C. Garman, M. Green, I. Miers et al., Zerocash: Decentralized anonymous payments from Bitcoin, IEEE Symposium on Security and Privacy, 2014.

A. Bielenberg, L. Helm, A. Gentilucci, D. Stefanescu, and H. Zhang, The growth of Diaspora - A decentralized online social network in the wild, 2012 Proceedings IEEE INFOCOM Workshops, 2012.
DOI : 10.1109/INFCOMW.2012.6193476

A. Birgisson, J. G. Politz, Ú. Erlingsson, A. Taly, M. Vrable et al., Macaroons: Cookies with Contextual Caveats for Decentralized Authorization in the Cloud, Proceedings 2014 Network and Distributed System Security Symposium, 2014.
DOI : 10.14722/ndss.2014.23212

A. Biryukov, D. Khovratovich, and I. Pustogarov, Deanonymisation of Clients in Bitcoin P2P Network, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, 2014.
DOI : 10.1007/978-3-642-39884-1_2

A. Biryukov, I. Pustogarov, and R. Weinmann, Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization, 2013 IEEE Symposium on Security and Privacy, p.2013
DOI : 10.1109/SP.2013.15

URL : http://doi.org/10.1109/sp.2013.15

J. Biskup and U. Flegel, Threshold-based identity recovery for privacy enhanced applications, Proceedings of the 7th ACM conference on Computer and communications security , CCS '00, 2000.
DOI : 10.1145/352600.352611

M. Blaze, J. Feigenbaum, and A. D. Keromytis, Keynote: Trust Management for Public-Key Infrastructures (position paper), 6th International Workshop on Security Protocols, 1998.
DOI : 10.1007/3-540-49135-x_9

D. Bogdanov, S. Laur, and J. Willemson, Sharemind: A Framework for Fast Privacy-Preserving Computations, 13th European Symposium on Research in Computer Security, 2008.
DOI : 10.1007/s001459910003

URL : http://www.math.ut.ee/%7Eswen/publications/articles/bogdanov-laur-willemson-2008.pdf

N. Borisov, G. Danezis, and I. Goldberg, Abstract, Proceedings on Privacy Enhancing Technologies, pp.4-24, 2015.
DOI : 10.1109/TIT.1976.1055638

S. Buchegger, D. Schiöberg, L. Vu, and A. Datta, Peer- SoN: P2P social networking: early experiences and insights, 2nd ACM EuroSys Workshop on Social Network Systems, 2009.
DOI : 10.1145/1578002.1578010

J. Camenisch, S. Hohenberger, M. Kohlweiss, A. Lysyanskaya, and M. Meyerovich, How to win the clonewars, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, 2006.
DOI : 10.1145/1180405.1180431

J. Camenisch and A. Lysyanskaya, An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation, International Conference on the Theory and Application of Cryptographic Techniques Advances in Cryptology, 2001.
DOI : 10.1007/3-540-44987-6_7

J. Camenisch, A. Lysyanskaya, and M. Meyerovich, Endorsed E-Cash, 2007 IEEE Symposium on Security and Privacy (SP '07), 2007.
DOI : 10.1109/SP.2007.15

M. Castro, P. Druschel, A. J. Ganesh, A. I. Rowstron, and D. S. Wallach, Secure routing for structured peerto-peer overlay networks, 5th USENIX Symposium on Operating System Design and Implementation, 2002.
DOI : 10.1145/844128.844156

H. Chan and A. Perrig, Efficient security primitives derived from a secure aggregation algorithm, Proceedings of the 15th ACM conference on Computer and communications security, CCS '08, 2008.
DOI : 10.1145/1455770.1455836

URL : http://www-2.cs.cmu.edu/~haowen/secure-aggregation-applications.pdf

D. Chaum, Untraceable electronic mail, return addresses, and digital pseudonyms, Commun. ACM, 1981.
DOI : 10.1007/978-1-4615-0239-5_14

URL : http://www.cs.utexas.edu/~shmat/courses/cs395t_fall04/chaum81.pdf

D. Chaum, The dining cryptographers problem: Unconditional sender and recipient untraceability, Journal of Cryptology, vol.1, issue.1, 1988.
DOI : 10.1007/BF00206326

URL : http://www.cs.ucsb.edu/~ravenben/classes/595n-s07/papers/dcnet-jcrypt88.pdf

Y. Chen, R. Sion, and B. Carbunar, XPay, Proceedings of the 8th ACM workshop on Privacy in the electronic society, WPES '09, 2009.
DOI : 10.1145/1655188.1655195

B. Chor, E. Kushilevitz, O. Goldreich, and M. Sudan, Private information retrieval, J. ACM, 1998.

I. Clarke, O. Sandberg, B. Wiley, and T. W. Hong, Freenet: A Distributed Anonymous Information Storage and Retrieval System, Designing Privacy Enhancing Technologies, International Workshop on Design Issues in Anonymity and Unobservability, 2000.
DOI : 10.1007/3-540-44702-4_4

H. Corrigan-gibbs, D. Boneh, and D. Mazières, Riposte: An Anonymous Messaging System Handling Millions of Users, 2015 IEEE Symposium on Security and Privacy, 2015.
DOI : 10.1109/SP.2015.27

E. Damiani, S. D. Di-vimercati, S. Paraboschi, P. Samarati, and F. Violante, A reputation-based approach for choosing reliable resources in peer-to-peer networks, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, 2002.
DOI : 10.1145/586110.586138

G. Danezis, C. Díaz, C. Troncoso, and B. Laurie, $\text{Drac}$ : An Architecture for Anonymous Low-Volume Communications, 10th Privacy Enhancing Technologies Symposium, 2010.
DOI : 10.1038/30918

G. Danezis, R. Dingledine, and N. Mathewson, Mixminion: design of a type III anonymous remailer protocol, Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405), 2003.
DOI : 10.1109/SECPRI.2003.1199323

G. Danezis, C. Lesniewski-laas, M. F. Kaashoek, and R. Anderson, Sybil-Resistant DHT Routing, European Symposium On Research In Computer Security, pp.305-318, 2005.
DOI : 10.1007/11555827_18

URL : http://www.cl.cam.ac.uk/~rja14/Papers/sybildht.pdf

G. Danezis and P. Mittal, SybilInfer: Detecting sybil nodes using social networks, Network and Distributed System Security Symposium, 2009.

J. Dean and S. Ghemawat, MapReduce, Communications of the ACM, vol.51, issue.1, 2008.
DOI : 10.14293/S2199-1006.1.SOR-UNCAT.AUNHT8.v1.RBZFIB

C. Decker, R. Eidenbenz, and R. Wattenhofer, Exploring and improving BitTorrent topologies, IEEE P2P 2013 Proceedings, 2013.
DOI : 10.1109/P2P.2013.6688698

C. Díaz, G. Danezis, C. Grothoff, A. Pfitzmann, and P. F. Syverson, Panel Discussion -Mix Cascades Versus Peerto-Peer: Is One Concept Superior?, Privacy Enhancing Technologies, pp.242-242, 2004.

C. Díaz, S. J. Murdoch, and C. Troncoso, Impact of Network Topology on Anonymity and Overhead in Low-Latency Anonymity Networks, 10th Privacy Enhancing Technologies Symposium, 2010.
DOI : 10.1145/1455770.1455812

C. Diaz, O. Tene, and S. Gurses, Hero or villain: The data controller in privacy law and technologies, Ohio St. LJ, vol.74, pp.923-963, 2013.

R. Dingledine and N. Mathewson, Anonymity loves company: Usability and the network effect, 5th Workshop on the Economics of Information Security (WEIS), 2006.

R. Dingledine and N. Mathewson, Design of a blockingresistant anonymity system. The Tor Project, Tech. Rep, issue.1, 2006.

R. Dingledine, N. Mathewson, and P. F. Syverson, Tor: The second-generation onion router, 13th USENIX Security Symposium, 2004.
DOI : 10.21236/ADA465464

URL : http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA465464&Location=U2&doc=GetTRDoc.pdf

. Dot-bit, Secure Decentralized DNS. https://bit.namecoin. info/. Last accessed, 2017.

J. R. Douceur, The Sybil Attack, 1st International Worksop on Peer-to-Peer Systems, 2002.
DOI : 10.1007/3-540-45748-8_24

Y. Duan, N. Youdao, J. Canny, and J. Z. Zhan, P4P: practical large-scale privacy-preserving distributed computation robust against malicious users, 19th USENIX Security Symposium, 2010.
DOI : 10.1007/978-1-4614-9242-9_8

M. Edman and P. F. Syverson, As-awareness in Tor path selection, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, 2009.
DOI : 10.1145/1653662.1653708

URL : http://www.freehaven.net/anonbib/cache/DBLP:conf/ccs/EdmanS09.pdf

T. Elahi, G. Danezis, and I. Goldberg, PrivEx, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, 2014.
DOI : 10.1007/978-3-642-03356-8_8

C. M. Ellison, Establishing identity without certification authorities, 6th USENIX Security Symposium, 1996.

L. Eschenauer and V. D. Gligor, A key-management scheme for distributed sensor networks, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, 2002.
DOI : 10.1145/586110.586117

E. Data and P. Supervisor, Opinion on privacy in the digital agePrivacy by Design" as a key tool to ensure citizen's trust in ICTS, 2010.

A. J. Feldman, A. Blankstein, M. J. Freedman, and E. W. Felten, Social networking with Frientegrity: Privacy and integrity with an untrusted provider, 21th USENIX Security Symposium, 2012.

M. Feldotto, C. Scheideler, and K. Graffi, HSkip+: A selfstabilizing overlay network for nodes with heterogeneous bandwidths, 14th IEEE International Conference on Peer-to-Peer Computing, 2014.
DOI : 10.1109/p2p.2014.6934300

URL : http://arxiv.org/pdf/1408.0395

M. J. Freedman and R. Morris, Tarzan, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, 2002.
DOI : 10.1145/586110.586137

R. Geambasu, T. Kohno, A. A. Levy, and H. M. Levy, Vanish: Increasing data privacy with self-destructing data, 18th USENIX Security Symposium, 2009.

. Gnutella, File sharing and distribution network, 2017.

G. Greenwald, No place to hide: Edward Snowden, the NSA, and the US surveillance state, 2014.

D. A. Gritzalis, Secure electronic voting, 2012.
DOI : 10.1007/978-1-4615-0239-5

E. Heilman, A. Kendler, A. Zohar, and S. Goldberg, Eclipse attacks on Bitcoin's peer-to-peer network, 24th USENIX Security Symposium, 2015.

S. Helmers, A brief history of anon.penet.fi: the legendary anonymous remailer, 1997.

M. Herrmann and C. Grothoff, Privacy-Implications of Performance-Based Peer Selection by Onion-Routers: A Real-World Case Study Using I2P, Privacy Enhancing Technologies, 2011.
DOI : 10.1007/978-3-642-22263-4_9

K. J. Hoffman, D. Zage, and C. Nita-rotaru, A survey of attack and defense techniques for reputation systems, ACM Computing Surveys, vol.42, issue.1, 2009.
DOI : 10.1145/1592451.1592452

S. Hohenberger, S. Myers, R. Pass, and A. Shelat, AN- ONIZE: A large-scale anonymous survey system, IEEE Symposium on Security and Privacy, 2014.
DOI : 10.1109/sp.2014.31

URL : http://ieee-security.org/TC/SP2014/papers/ANONIZE_c_ALarge-ScaleAnonymousSurveySystem.pdf

R. Janakiraman, M. Waldvogel, and Q. Zhang, Indra: a peer-to-peer approach to network intrusion detection and prevention, WET ICE 2003. Proceedings. Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2003., 2003.
DOI : 10.1109/ENABL.2003.1231412

A. Johnson, P. F. Syverson, R. Dingledine, and N. Mathewson, Trust-based anonymous communication, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, 2011.
DOI : 10.1145/2046707.2046729

A. Johnson, C. Wacek, R. Jansen, M. Sherr, and P. F. Syverson, Users get routed, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, 2013.
DOI : 10.1145/2508859.2516651

P. C. Johnson, A. Kapadia, P. P. Tsang, and S. W. Smith, Nymble: Anonymous IP-Address Blocking, 7th Privacy Enhancing Technologies Symposium, 2007.
DOI : 10.1007/978-3-540-75551-7_8

J. Juen, A. Johnson, A. Das, N. Borisov, and M. Caesar, Abstract, Proceedings on Privacy Enhancing Technologies, vol.41, issue.2, 2015.
DOI : 10.1515/popets-2015-0021

M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, Plutus: Scalable secure file sharing on untrusted storage, USENIX Conference on File and Storage Technologies, 2003.

A. Kapadia and N. Triandopoulos, Halo: High-assurance locate for distributed hash tables, Network and Distributed System Security Symposium, 2008.

G. Karame, E. Androulaki, and S. Capkun, Doublespending fast payments in Bitcoin, 19th ACM Conference on Computer and Communications Security, 2012.
DOI : 10.1145/2382196.2382292

R. Kumaresan and I. Bentov, How to Use Bitcoin to Incentivize Correct Computations, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, 2014.
DOI : 10.1007/s00145-008-9036-8

L. Lamport, Time, clocks, and the ordering of events in a distributed system, Communications of the ACM, vol.21, issue.7, 1978.
DOI : 10.1145/359545.359563

B. Laurie, Certificate transparency. Queue, 2014.
DOI : 10.1145/2659897

S. Le-blond, P. Manils, A. Chaabane, M. A. Kaafar, A. Legout et al., Poster: Deanonymizing BitTorrent users on Tor, 7th USENIX Symposium on Network Design and Implementation (NSDI'10), 2010.

C. Lesniewski-laas, B. Ford, J. Strauss, R. Morris, and M. F. Kaashoek, Alpaca, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, 2007.
DOI : 10.1145/1315245.1315299

F. Lesueur, L. Mé, and V. V. Tong, An efficient distributed PKI for structured P2P networks, 2009 IEEE Ninth International Conference on Peer-to-Peer Computing, 2009.
DOI : 10.1109/P2P.2009.5284491

URL : https://hal.archives-ouvertes.fr/hal-00423320

N. Li, W. H. Winsborough, and J. C. Mitchell, Distributed credential chain discovery in trust management, Journal of Computer Security, 2003.
DOI : 10.1145/501983.502005

Z. Li, S. Alrwais, Y. Xie, F. Yu, and X. Wang, Finding the linchpins of the dark web: a study on topologically dedicated hosts on malicious web infrastructures, IEEE Symposium on Security and Privacy, 2013.

Y. Liu and J. Pan, The impact of NAT on BitTorrent-like P2P systems, 9th International Conference on Peer-to- Peer Computing, 2009.

J. Maheswaran, D. I. Wolinsky, and B. Ford, Crypto-Book, Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks, HotNets-XII, p.14, 2013.
DOI : 10.1145/2535771.2535798

J. Mclachlan, A. Tran, N. Hopper, and Y. Kim, Scalable onion routing with torsk, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, 2009.
DOI : 10.1145/1653662.1653733

M. S. Melara, A. Blankstein, J. Bonneau, E. W. Felten, and M. J. Freedman, CONIKS: bringing key transparency to end users, 24th USENIX Security Symposium, 2015.

B. Mitra, F. Peruani, S. Ghose, and N. Ganguly, Analyzing the vulnerability of superpeer networks against attack, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, 2007.
DOI : 10.1145/1315245.1315274

P. Mittal and N. Borisov, Information leaks in structured peer-to-peer anonymous communication systems, 15th ACM Conference on Computer and Communications Security, 2008.
DOI : 10.1145/1455770.1455805

URL : http://www.freehaven.net/anonbib/cache/ccs2008:mittal.pdf

P. Mittal and N. Borisov, ShadowWalker, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, 2009.
DOI : 10.1145/1653662.1653683

P. Mittal, M. Caesar, and N. Borisov, X-Vine: Secure and pseudonymous routing in DHTs using social networks, 19th Network and Distributed System Security Symposium, 2012.

P. Mittal, F. G. Olumofin, C. Troncoso, N. Borisov, and I. Goldberg, PIR-Tor: Scalable anonymous communication using private information retrieval, 20th USENIX Security Symposium, 2011.

P. Mittal, C. Papamanthou, and D. Song, Preserving link privacy in social network based systems, 20th Network and Distributed System Security Symposium(NDSS). Internet Society, 2013.

P. Mittal, M. K. Wright, and N. Borisov, Pisces: Anonymous communication using social networks, 20th Network and Distributed System Security Symposium, 2013.

F. Monrose and S. Krishnan, DNS prefetching and its privacy implications: When good things go bad, 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2010.

S. J. Murdoch and R. N. Watson, Metrics for Security and Performance in Low-Latency Anonymity Systems, 8th Privacy Enhancing Technologies Symposium, 2008.
DOI : 10.1007/978-3-540-70630-4_8

S. J. Murdoch and P. Zielinski, Sampled Traffic Analysis by Internet-Exchange-Level Adversaries, 7th International Symposium on Privacy Enhancing Technologies, 2007.
DOI : 10.1007/978-3-540-75551-7_11

S. Nakamoto, Bitcoin: A peer-to-peer electronic cash system, 2008.

A. Nambiar and M. K. Wright, Salsa, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, 2006.
DOI : 10.1145/1180405.1180409

A. Narayanan and V. Shmatikov, De-anonymizing Social Networks, 2009 30th IEEE Symposium on Security and Privacy, 2009.
DOI : 10.1109/SP.2009.22

URL : http://arxiv.org/pdf/0903.3276

A. Narayanan, V. Toubiana, S. Barocas, H. Nissenbaum, and D. Boneh, A critical look at decentralized personal data architectures. arXiv preprint arXiv, pp.1202-4503, 2012.

M. A. Nasir, S. Girdzijauskas, and N. Kourtellis, Socially-aware distributed hash tables for decentralized online social networks, 2015 IEEE International Conference on Peer-to-Peer Computing (P2P), 2015.
DOI : 10.1109/P2P.2015.7328524

URL : http://arxiv.org/pdf/1508.05591

S. Nilizadeh, S. Jahid, P. Mittal, N. Borisov, and A. Kapadia, Cachet, Proceedings of the 8th international conference on Emerging networking experiments and technologies, CoNEXT '12, 2012.
DOI : 10.1145/2413176.2413215

A. Oram, Peer-to-Peer: Harnessing the power of disruptive technologies, 2001.

B. Parno, A. Perrig, and V. D. Gligor, Distributed Detection of Node Replication Attacks in Sensor Networks, 2005 IEEE Symposium on Security and Privacy (S&P'05), 2005.
DOI : 10.1109/SP.2005.8

T. Paul, A. Famulari, and T. Strufe, A survey on decentralized Online Social Networks, Computer Networks, vol.75, 2014.
DOI : 10.1016/j.comnet.2014.10.005

A. Pfitzmann and M. Hansen, Anonymity, unlinkability, unobservability, pseudonymity, and identity management ? a consolidated proposal for terminology, 2005.
DOI : 10.1007/3-540-44702-4_1

J. A. Pouwelse, P. Garbacki, J. Wang, A. Bakker, J. Yang et al., TRIBLER: a social-based peer-to-peer system, 5th International workshop on Peer-To-Peer Systems (IPTPS), 2006.
DOI : 10.1007/11549468_125

T. Pulls, R. Peeters, and K. Wouters, Distributed privacypreserving transparency logging, 12th ACM Workshop on Privacy in the Electronic Society, p.2013
DOI : 10.1145/2517840.2517847

M. A. Rajab, F. Monrose, and A. Terzis, On the effectiveness of distributed worm monitoring, 14th USENIX Security Symposium, 2005.

M. Raya, M. H. Manshaei, M. Félegyházi, and J. Hubaux, Revocation games in ephemeral networks, Proceedings of the 15th ACM conference on Computer and communications security, CCS '08, 2008.
DOI : 10.1145/1455770.1455797

M. K. Reiter and A. D. Rubin, Crowds: anonymity for Web transactions, ACM Transactions on Information and System Security, vol.1, issue.1, 1998.
DOI : 10.1145/290163.290168

Y. Rekhter, T. Li, and S. Hares, A border gateway protocol 4 (BGP-4), 2005.
DOI : 10.17487/rfc1771

URL : http://ietfreport.isoc.org/rfc/PDF/rfc-pdf/rfc1105.pdf

R. L. Rivest and B. Lampson, Sdsi-a simple distributed security infrastructure. Crypto, 1996.

P. Rogaway and M. Bellare, Robust computational secret sharing and a unified account of classical secret-sharing goals, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, 2007.
DOI : 10.1145/1315245.1315268

C. Rossow, D. Andriesse, T. Werner, B. Stone-gross, D. Plohmann et al., SoK: P2PWNED - Modeling and Evaluating the Resilience of Peer-to-Peer Botnets, 2013 IEEE Symposium on Security and Privacy, 2013.
DOI : 10.1109/SP.2013.17

J. M. Rushby, Design and verification of secure systems, 1981.
DOI : 10.1145/800216.806586

URL : http://www.csl.sri.com/users/rushby/papers/sosp81.ps.gz

P. Schaar, Privacy by Design, Identity in the Information Society, vol.3, issue.2, pp.267-274, 2010.
DOI : 10.1007/s12394-010-0055-x

S. Schiffner, A. Pashalidis, and E. Tischhauser, On the limits of privacy in reputation systems, Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, WPES '11, 2011.
DOI : 10.1145/2046556.2046561

B. Schmidt, R. Sasse, C. Cremers, and D. A. Basin, Automated Verification of Group Key Agreement Protocols, 2014 IEEE Symposium on Security and Privacy, 2014.
DOI : 10.1109/SP.2014.19

M. Selimi and F. Freitag, Tahoe-LAFS Distributed Storage Service in Community Network Clouds, 2014 IEEE Fourth International Conference on Big Data and Cloud Computing, pp.17-24, 2014.
DOI : 10.1109/BDCloud.2014.24

S. Seong, J. Seo, M. Nasielski, D. Sengupta, S. Hangal et al., PrPl, Proceedings of the 1st ACM Workshop on Mobile Cloud Computing & Services Social Networks and Beyond, MCS '10, 2010.
DOI : 10.1145/1810931.1810939

A. Shamir, How to share a secret, Communications of the ACM, vol.22, issue.11, 1979.
DOI : 10.1145/359168.359176

R. Sharma and A. Datta, SuperNova: Super-peers based architecture for decentralized online social networks, 2012 Fourth International Conference on Communication Systems and Networks (COMSNETS 2012), 2012.
DOI : 10.1109/COMSNETS.2012.6151349

URL : http://arxiv.org/pdf/1105.0074.pdf

M. Sherr, M. Blaze, and B. T. Loo, Scalable Link-Based Relay Selection for Anonymous Routing, 9th Privacy Enhancing Technologies Symposium, 2009.
DOI : 10.1007/978-3-642-03168-7_5

URL : https://repository.upenn.edu/cgi/viewcontent.cgi?article=1446&context=cis_papers

R. Snader and N. Borisov, A tune-up for Tor: Improving security and performance in the tor network, 15th Network and Distributed System Security Symposium, 2008.

E. Sparrow, H. Halpin, K. Kaneko, R. Pollan, E. Stefanov et al., LEAP: A next-generation client VPN and encrypted email provider Multi-cloud oblivious storage, International Conference on Cryptology and Network Security ACM SIGSAC Conference on Computer and Communications Security, pp.176-191, 2013.
DOI : 10.1007/978-3-319-48965-0_11

I. Stoica, R. Morris, D. R. Karger, M. F. Kaashoek, and H. Balakrishnan, Chord: A scalable peer-to-peer lookup service for Internet applications, SIGCOMM, 2001.
DOI : 10.1109/tnet.2002.808407

M. W. Storer, K. M. Greenan, E. L. Miller, and K. Voruganti, POTSHARDS: secure long-term storage without encryption, 2007.

R. Süselbeck, G. Schiele, P. Komarnicki, and C. Becker, Efficient bandwidth estimation for peer-to-peer systems, 2011 IEEE International Conference on Peer-to-Peer Computing, 2011.
DOI : 10.1109/P2P.2011.6038656

P. F. Syverson, D. M. Goldschlag, and M. G. Reed, Anonymous connections and onion routing, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097), 1997.
DOI : 10.1109/SECPRI.1997.601314

URL : http://www.csl.mtu.edu/cs6461/www/Reading/08/Reed-jsac98.pdf

. Taler, Taxable anonymous libre electronic reserve. https: //taler, Last accessed, 2017.

C. Tang and I. Goldberg, An improved algorithm for tor circuit scheduling, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, 2010.
DOI : 10.1145/1866307.1866345

URL : http://www.cypherpunks.ca/%7Eiang/pubs/ewma-ccs.pdf

A. Tran, N. Hopper, and Y. Kim, Hashing it out in public, Proceedings of the 8th ACM workshop on Privacy in the electronic society, WPES '09, 2009.
DOI : 10.1145/1655188.1655199

P. P. Tsang, M. H. Au, A. Kapadia, and S. W. Smith, Blacklistable anonymous credentials, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, 2007.
DOI : 10.1145/1315245.1315256

P. P. Tsang, M. H. Au, A. Kapadia, and S. W. Smith, PEREA, Proceedings of the 15th ACM conference on Computer and communications security, CCS '08, 2008.
DOI : 10.1145/1455770.1455813

P. P. Tsang, A. Kapadia, C. Cornelius, and S. W. Smith, Nymble: Blocking Misbehaving Users in Anonymizing Networks, IEEE Transactions on Dependable and Secure Computing, vol.8, issue.2, 2011.
DOI : 10.1109/TDSC.2009.38

E. Y. Vasserman, R. Jansen, J. Tyra, N. Hopper, and Y. Kim, Membership-concealing overlay networks, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, 2009.
DOI : 10.1145/1653662.1653709

J. Verkamp and M. Gupta, Inferring mechanics of web censorship around the world, 2nd USENIX Workshop on Free and Open Communications on the Internet, 2012.

C. Wacek, H. Tan, K. S. Bauer, and M. Sherr, An empirical evaluation of relay selection in Tor, 20th Network and Distributed System Security Symposium, 2013.

M. Wachs, F. Oehlmann, and C. Grothoff, Automatic transport selection and resource allocation for resilient communication in decentralised networks, 14-th IEEE International Conference on Peer-to-Peer Computing, 2014.
DOI : 10.1109/P2P.2014.6934301

M. Wachs, M. Schanzenbach, and C. Grothoff, A Censorship-Resistant, Privacy-Enhancing and Fully Decentralized Name System, 13th International Conference on Cryptology and Network Security, 2014.
DOI : 10.1007/978-3-319-12280-9_9

M. Waldman and D. Mazières, Tangler, Proceedings of the 8th ACM conference on Computer and Communications Security , CCS '01, 2001.
DOI : 10.1145/501983.502002

M. Waldman, A. D. Rubin, and L. F. Cranor, Publius: A robust, tamper-evident, censorship-resistant, and sourceanonymous web publishing system, 9th USENIX Security Symposium, 2000.

L. Wang and J. Kangasharju, Measuring large-scale distributed systems: case of BitTorrent Mainline DHT, IEEE P2P 2013 Proceedings, 2013.
DOI : 10.1109/P2P.2013.6688697

Q. Wang, Z. Lin, N. Borisov, and N. Hopper, rBridge: User reputation based Tor bridge distribution with privacy preservation, 20th Network and Distributed System Security Symposium, 2013.

Q. Wang, P. Mittal, and N. Borisov, In search of an anonymous and secure lookup, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, 2010.
DOI : 10.1145/1866307.1866343

X. Wang, S. Chen, and S. Jajodia, Tracking anonymous peer-to-peer VoIP calls on the internet, Proceedings of the 12th ACM conference on Computer and communications security , CCS '05, 2005.
DOI : 10.1145/1102120.1102133

B. Wilcox-o-'hearn, Experiences deploying a large-scale emergent network, International Workshop on Peer-to- Peer Systems, pp.104-110, 2002.

M. Winslett, C. C. Zhang, and P. A. Bonatti, PeerAccess, Proceedings of the 12th ACM conference on Computer and communications security , CCS '05, 2005.
DOI : 10.1145/1102120.1102144

E. Wobber, M. Abadi, M. Burrows, and B. Lampson, Authentication in the Taos operating system, ACM Transactions on Computer Systems, vol.12, issue.1, pp.3-32, 1994.
DOI : 10.1145/174613.174614

E. Wobber, M. Abadi, M. Burrows, and B. W. Lampson, Authentication in the Taos operating system, 14th ACM Symposium on Operating System Principles, 1993.

S. Wolchok, O. S. Hofmann, N. Heninger, E. W. Felten, J. A. Halderman et al., Defeating Vanish with low-cost sybil attacks against large DHTs, Network and Distributed System Security Symposium, 2010.

D. I. Wolinsky, H. Corrigan-gibbs, B. Ford, and A. Johnson, Dissent in numbers: Making strong anonymity scale, 10th USENIX Symposium on Operating Systems Design and Implementation, 2012.

M. K. Wright, M. Adler, B. N. Levine, and C. Shields, An analysis of the degradation of anonymous protocols, Network and Distributed System Security Symposium, 2002.

M. K. Wright, M. Adler, B. N. Levine, and C. Shields, The predecessor attack, ACM Transactions on Information and System Security, vol.7, issue.4, 2004.
DOI : 10.1145/1042031.1042032

J. J. Wylie, M. W. Bigrigg, J. D. Strunk, G. R. Ganger, H. Kiliççöte et al., Survivable information storage systems, Computer, vol.33, issue.8, 2000.
DOI : 10.1109/2.863969

URL : http://www.pdl.cs.cmu.edu/PDL-FTP/Storage/PASIS.pdf

. Yacy, The Peer to Peer Search Engine, 2017.

B. Yang and H. Garcia-molina, PPay, Proceedings of the 10th ACM conference on Computer and communication security , CCS '03, 2003.
DOI : 10.1145/948109.948150

M. Young, A. Kate, I. Goldberg, and M. Karsten, Practical Robust Communication in DHTs Tolerating a Byzantine Adversary, 2010 IEEE 30th International Conference on Distributed Computing Systems, 2010.
DOI : 10.1109/ICDCS.2010.31

URL : http://www.cacr.math.uwaterloo.ca/techreports/2009/cacr2009-31.pdf

]. H. Yu, P. B. Gibbons, M. Kaminsky, and F. Xiao, Sybil- Limit: A near-optimal social network defense against Sybil attacks, IEEE/ACM Trans. Netw, 2010.
DOI : 10.1109/sp.2008.13

URL : http://www.comp.nus.edu.sg/~yuhf/yuh-sybillimit.pdf

H. Yu, P. B. Gibbons, and C. Shi, DCast, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, 2012.
DOI : 10.1145/2382196.2382256

D. J. Zage and C. Nita-rotaru, On the accuracy of decentralized virtual coordinate systems in adversarial networks, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, 2007.
DOI : 10.1145/1315245.1315273

E. Zhai, R. Chen, Z. Cai, L. Zhang, E. K. Lua et al., Sorcery: Could we make P2P content sharing systems robust to deceivers?, 2009 IEEE Ninth International Conference on Peer-to-Peer Computing, 2009.
DOI : 10.1109/P2P.2009.5284532

E. Zhai, D. I. Wolinsky, R. Chen, E. Syta, C. Teng et al., Anonrep: Towards tracking-resistant anonymous reputation, 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16), pp.583-596, 2016.

X. Zhang, H. Hsiao, G. Hasker, H. Chan, A. Perrig et al., SCION: Scalability, control, and isolation on next-generation networks, IEEE Symposium on Security and Privacy, 2011.
DOI : 10.1109/sp.2011.45

B. Zhu, S. Setia, and S. Jajodia, Providing witness anonymity in peer-to-peer systems, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, 2006.
DOI : 10.1145/1180405.1180408

S. Zhu, S. Setia, and S. , LEAP+: Efficient security mechanisms for large-scale distributed sensor networks, Jajodia, 2006.

G. Zyskind, O. Nathan, and A. Pentland, Enigma: Decentralized computation platform with guaranteed privacy, 1506.