W. Ahmad and A. Khokhar, Secure aggregation in large scale overlay networks, IEEE Global Telecommunications Conference (GLOBECOM '06), 2006.

´. A. Berta, V. Bilicki, and M. Jelasity, Defining and understanding smartphone churn over the internet: A measurement study, 14-th IEEE International Conference on Peer-to-Peer Computing, 2014.
DOI : 10.1109/P2P.2014.6934317

D. Bickson, T. Reinman, D. Dolev, and B. Pinkas, Peer-to-peer secure multi-party numerical computation facing malicious adversaries. Peer-to-Peer Networking and Applications, pp.129-144, 2010.
DOI : 10.1007/s12083-009-0051-9

URL : http://arxiv.org/pdf/0901.2689

C. M. Bishop, Pattern Recognition and Machine Learning, 2006.

L. Bottou, Stochastic Gradient Descent Tricks, Neural Networks: Tricks of the Trade, pp.421-436, 2012.
DOI : 10.1137/1116025

URL : http://leon.bottou.org/publications/pdf/tricks-2012.pdf

L. Bottou and Y. Lecun, Large scale online learning, Advances in Neural Information Processing Systems 16, 2004.

C. Clifton, M. Kantarcioglu, J. Vaidya, X. Lin, and M. Y. Zhu, Tools for privacy preserving distributed data mining, ACM SIGKDD Explorations Newsletter, vol.4, issue.2, pp.28-34, 2002.
DOI : 10.1145/772862.772867

O. Dekel, R. Gilad-bachrach, O. Shamir, and L. Xiao, Optimal distributed online prediction using mini-batches, J. Mach. Learn. Res, vol.13, issue.1, pp.165-202, 2012.

C. Dwork, A firm foundation for private data analysis, Communications of the ACM, vol.54, issue.1, pp.86-95, 2011.
DOI : 10.1145/1866739.1866758

C. Dwork, K. Kenthapadi, F. Mcsherry, I. Mironov, and M. Naor, Our Data, Ourselves: Privacy Via Distributed Noise Generation, Lecture Notes in Computer Science, vol.77, issue.1, pp.486-503, 2006.
DOI : 10.1109/SFCS.2000.892063

URL : http://www.wisdom.weizmann.ac.il/~naor/PAPERS/odo.pdf

K. Gimpel, D. Das, and N. A. Smith, Distributed asynchronous online learning for natural language processing, Proceedings of the Fourteenth Conference on Computational Natural Language Learning (CoNLL'10, pp.213-222, 2010.

S. Han, W. K. Ng, L. Wan, and V. C. Lee, Privacy-Preserving Gradient-Descent Methods, IEEE Transactions on Knowledge and Data Engineering, vol.22, issue.6, pp.884-899, 2010.
DOI : 10.1109/TKDE.2009.153

G. P. Jesi, A. Montresor, and M. Van-steen, Secure peer sampling, Computer Networks, vol.54, issue.12, pp.2086-2098, 2010.
DOI : 10.1016/j.comnet.2010.03.020

M. Lichman, UCI machine learning repository, 2013.

J. Ma, L. K. Saul, S. Savage, and G. M. Voelker, Identifying suspicious URLs, Proceedings of the 26th Annual International Conference on Machine Learning, ICML '09, pp.681-688, 2009.
DOI : 10.1145/1553374.1553462

U. Maurer, Secure multi-party computation made simple, Discrete Applied Mathematics, vol.154, issue.2, pp.370-381, 2006.
DOI : 10.1016/j.dam.2005.03.020

URL : https://doi.org/10.1016/j.dam.2005.03.020

J. A. Naranjo, L. G. Casado, and M. Jelasity, Asynchronous privacy-preserving iterative computation on peer-to-peer networks, Computing, vol.22, issue.11, pp.8-10, 2012.
DOI : 10.1109/SFCS.1986.25

R. Ormándi, I. Heged?-us, and M. Jelasity, Gossip learning with linear models on fully distributed data, Concurrency and Computation: Practice and Experience, vol.2005, issue.1, pp.556-571, 2013.
DOI : 10.1023/A:1007515423169

P. Paillier, Public-Key Cryptosystems Based on Composite Degree Residuosity Classes, Advances in Cryptology ? EUROCRYPT '99, pp.223-238, 1999.
DOI : 10.1007/3-540-48910-X_16

A. Rajkumar and S. Agarwal, A differentially private stochastic gradient descent algorithm for multiparty classification, Conference Proceedings, pp.933-941, 2012.

R. Roverso, J. Dowling, and M. Jelasity, Through the wormhole: Low cost, fresh peer sampling for the Internet, IEEE P2P 2013 Proceedings, 2013.
DOI : 10.1109/P2P.2013.6688707

J. Saia and M. Zamani, Recent Results in Scalable Multi-Party Computation, 41st International Conference on Current Trends in Theory and Practice of Computer Science (SOF- SEM'15), 2015.
DOI : 10.1007/978-3-662-46078-8_3

D. Stutzbach, R. Rejaie, N. Duffield, S. Sen, and W. Willinger, On Unbiased Sampling for Unstructured Peer-to-Peer Networks, IEEE/ACM Transactions on Networking, vol.17, issue.2, pp.377-390, 2009.
DOI : 10.1109/TNET.2008.2001730

A. C. Yao, Protocols for secure computations, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982), pp.160-164, 1982.
DOI : 10.1109/SFCS.1982.38