[Aditya, P., Erdélyi, V., Lentz, M., Shi, E., Bhattacharjee, B. and Druschel, P. (2014). Encore: Private, context-based communication for mobile social apps, Proceedings of the 12th Annual International Conference on Mobile Systems, Applications, and Services, Bretton Woods, NH, USA, pp. 135-148.]Search in Google Scholar
[Baruah, T. (2012). Effectiveness of social media as a tool of communication and its potential for technology enabled connections: A micro-level study, International Journal of Scientific and Research Publications 2(5): 1-10.]Search in Google Scholar
[Berthold, O., Federrath, H. and Kpsell, S. (2001). Web mixes: A system for anonymous and unobservable internet access, International Workshop on Designing Privacy Enhancing Technologies: Design Issues in Anonymity and Unobservability, Berkeley, CA, USA, pp. 115-129.]Search in Google Scholar
[Boyd, C., Mao, W. and Paterson, K.G. (2005). Deniable authenticated key establishment for internet protocols, in B. Christianson et al. (Eds.), Security Protocols, Springer, Berlin/Heidelberg, pp. 255-271.10.1007/11542322_31]Search in Google Scholar
[Dabek, F., Li, J., Sit, E., Robertson, J., Kaashoek, M. and Morris, R. (2004). Designing a DHT for low latency and high throughput, Proceedings of the 1st USENIX Symposium on Networked Systems Design and Implementation (NSDI’04), San Francisco, CA, USA, p. 7.]Search in Google Scholar
[Damiani, E., De Capitani di Vimercati, S., Paraboschi, S. and Samarati, P. (2004). P2P-based collaborative spam detection and filtering, 4th International Conference on Peer-to-Peer Computing (P2P 2004), Zurich, Switzerland, pp. 176-183.]Search in Google Scholar
[Dikranjan, D. (1998). Recent advances in minimal topological groups, Topology and its Applications 85(1): 53-91.10.1016/S0166-8641(97)00141-7]Search in Google Scholar
[ENISA (2012). Algorithms, key sizes and parameters report-2013 recommendations, Technical report, European Union Agency for Network and Information Security Agency, Heraklion.]Search in Google Scholar
[Frankel, S., Glenn, R. and Kelly, S. (2003). The AES-CBC cipher algorithm and its use with IPSEC, RFC 3602, Network Working Group, https://tools.ietf.org/html/rfc3602.]Search in Google Scholar
[Gilbert, S. and Lynch, N. (2002). Brewer’s conjecture and the feasibility of consistent, available, partition-tolerant web services, SIGACT News 33(2): 51-59.10.1145/564585.564601]Search in Google Scholar
[Laprie, J.C., Avizienis, A. and Kopetz, H. (Eds.) (1992). Dependability: Basic Concepts and Terminology, Springer-Verlag New York, Secaucus, NJ.10.1007/978-3-7091-9170-5]Search in Google Scholar
[Lv, X., Li, H. and Wang, B. (2012). Group key agreement for secure group communication in dynamic peer systems, Journal of Parallel and Distributed Computing 72(10): 1195-1200.10.1016/j.jpdc.2012.06.004]Search in Google Scholar
[Mannan, M. and van Oorschot, P. (2006). A protocol for secure public instant messaging, 10th International Conference on Financial Cryptography and Data Security, Anguilla, British West Indies, pp. 20-35.]Search in Google Scholar
[Miller, K. (2014). Organizational Communication: Approaches and Processes, Cengage Learning, Boston, MA.]Search in Google Scholar
[Montresor, A. and Jelasity, M. (2009). PeerSim: A scalable P2P simulator, IEEE 9th International Conference on Peer-to- Peer Computing, P2P’09, Seattle, WA, USA, pp. 99-100.]Search in Google Scholar
[Moore, A. and Zuev, D. (2005). Internet traffic classification using Bayesian analysis techniques, Proceedings of the International Conference on Measurements and Modeling of Computer Systems, SIGMETRICS 2005, Banff, Alberta, Canada, pp. 50-60.]Search in Google Scholar
[Mooser, M., Boohme, R. and Breuker, D. (2014). Towards risk scoring of Bitcoin transactions, Financial Cryptography and Data Security FC 2014 Workshops, Bridgetown, Barbados, pp. 16-32.]Search in Google Scholar
[Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system, www.bitcoin.org.]Search in Google Scholar
[Payne, B. and Edwards,W. (2008). A brief introduction to usable security, IEEE Internet Computing 12(3): 13-21.10.1109/MIC.2008.50]Search in Google Scholar
[Rivest, R. L., Shamir, A. and Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM 21(2): 120-126.10.1145/359340.359342]Search in Google Scholar
[Rowstron, A., Kermarrec, A., Castro, M. and Druschel, P. (2001). SCRIBE: The design of a large-scale event notification infrastructure, Proceedings of the 3rd International COST264 Workshop on Networked Group Communication, NGC’01, London, UK, pp. 30-43.]Search in Google Scholar
[Sakarindr, P. and Ansari, N. (2010). Survey of security services on group communications, IET Information Security 4(4): 258-272.10.1049/iet-ifs.2009.0261]Search in Google Scholar
[Saxena, A., Misra, J. and Dhar, A. (2014). Increasing anonymity in Bitcoin, in N. Christin and R. Safav-Naini (Eds.), Financial Cryptography and Data Security, Springer, Berlin/Heidelberg, pp. 122-139.10.1007/978-3-662-44774-1_9]Search in Google Scholar
[Schoder, D. and Fischbach, K. (2003). Peer-to-peer prospects, Communications of the ACM 46(2): 27-29.10.1145/606272.606294]Search in Google Scholar
[Schollmeier, R. (2001). A definition of peer-to-peer networking for the classification of peer-to-peer architectures and applications, Proceedings of the 1st International Conference on Peer-to-Peer Computing, P2P’01, Link¨oping, Sweden, pp. 101-102.]Search in Google Scholar
[SDCDev (2014). Shadowcoin secure messaging: A P2P encrypted instant messaging system, www.shadowcoin.co.]Search in Google Scholar
[Serjantov, A. (2002). Anonymizing censorship resistant systems, in P. Druschel et al. (Eds.), Peer-to-Peer Systems, Lecture Notes in Computer Science, Vol. 2429, Springer, Berlin/Heidelberg, pp. 111-120.10.1007/3-540-45748-8_11]Search in Google Scholar
[Sit, E. and Morris, R. (2002). Security considerations for peer-to-peer distributed hash tables, Revised Papers from the 1st International Workshop on Peer-to-Peer Systems, IPTPS’01, Cambridge, MA, USA, pp. 261-269.]Search in Google Scholar
[Sompolinsky, Y. and Zohar, A. (2013). Accelerating Bitcoin’s transaction processing. Fast money grows on trees, not chains, IACR Cryptology ePrint Archive 2013: 881.]Search in Google Scholar
[Völker, L., Noe, M., Waldhorst, O.P., Werle, C. and Sorge, C. (2011). Can internet users protect themselves? Challenges and techniques of automated protection of http communication, Computer Communications 34(3): 457-467.10.1016/j.comcom.2010.06.016]Search in Google Scholar
[Warren, J. (2012). Bitmessage: A peer-to-peer message authentication and delivery system, www.bitmessage.org.]Search in Google Scholar
[Weninger, T. (2014). An exploration of submissions and discussions in social news: Mining collective intelligence of Reddit, Social Network Analysis and Mining 4(1): 1-19.10.1007/s13278-014-0173-9]Search in Google Scholar
[Xiao, Z., Guo, L. and Tracey, J. M. (2007). Understanding instant messaging traffic characteristics, 27th IEEE International Conference on Distributed Computing Systems (ICDCS 2007), Toronto, Ontario, Canada, p. 51.]Search in Google Scholar
[Xie, M. and Wang, H. (2012). Secure instant messaging in enterprise-like networks, Computer Networks 56(1): 448-461.10.1016/j.comnet.2011.09.006]Search in Google Scholar
[Zhang, Q., Cheng, L. and Boutaba, R. (2010). Cloud computing: State-of-the-art and research challenges, Journal of Internet Services and Applications 1(1): 7-18. 10.1007/s13174-010-0007-6]Search in Google Scholar