3HANNEMAN R A, RIDDLE M. Introduction to social network methods [ M/OL]. (2005). http://www. faculty, ucr. edu/- hannemart/nettext/.
4LESKOVEC J, HORVITZ E. Planetary-scale views on a large instantmessaging network [ C ]//Proc of the 17th International Conference on World Wide Web. 2008:915-924.
5REITER M K, RUBIN A D. Crowds:anonymity for Web transactions [J]. ACM Trans on Information and System Security, 1998,1 ( 1 ) :55-92.
6GOLDSCHLAG D, REED M, SYVERSON P. Onion routing for anonymous and private Internet connections [ J]. Communications of the ACM,1999 ,42( 2 ) :39-41.
7DINGLEDINE R, MATHEWSON N, SYVERSON P. Tor: the second-generation onion router[ C ]//Proc of the 13th USE NIX Security Symposium. 2004 : 303- 320.
8CAVERLEE J, WEBB S. A large-scale study of Myspace:observations and implications for online social networks [ C ]//Proc of International Conference on Weblogs and Social Media. 2008.
9GROSS R, ACQUISTI A. Information revelation and privacy in online social networks[ C ]//Proc of ACM Workshop on Privacy in the Elec- tronic Society. 2005:71-80.
10HUBERMAN B A,ADAR E,FINE L R. Valuating privacy[ J]. IEEE Security and Privacy,2005,3(5 ) :22-25.