[ 1] M R, Foster I. M app ing the Gnutella netwo rk[ J]. IEEE Interne t Compu ting, 2002, 6: 50-57.
[ 2] Pe tarM aym ounkov, Dav idM az i res. Kadem lia: a Pee r- to-Peer informa tion system based on the XOR m etr ic[ C] / / Peer- to-Peer Sy stem s: The 1st Internationa lW o rkshop, IPTPS 2002. C ambr idge, USA, 2002: 7-8.
[ 3] Saro iu S, Gumm ad i P K, Gr ibb le S D. A m easurement study o f peer-to-peer file shar ing system s[ C] / /M ultim edia Com puting and Netw ork ing 2002 (MM CN2002). Ca lifo rn ia, USA, 2002: 156-170.
[ 4] Ka rlo Berket, Abdelilah E ssiar,i A rturM uratas. PK I-based secu rity fo r p2p inform a tion shar ing[ C ] / / Proceed ings of the 4 th
Interna tiona l Conference on Peer- to-Pee rC om puting. W ash ing ton, 2004: 45-52.
[ 5] Pa illier P. T rapdoo ring d iscre te logar ithm s on e lliptic curves over r ing s[ C ] / / Proceed ing s o f the 6 th Interna tiona l Conference
on the Theory and Application o f Crypto logy and Informa tion Secur ity: Advance in Cryp to logy. Singapo re, 2000: 573-584.
[ 6] R ita Chen, W illiam Y eager. Pob lano a d istributed trust m ode l fo r peer-to-peer ne tw orks[ EB /OL]. ( 2005-03-01) [ 2007-04-11]. http: / /www. jx ta. org /docs/ trust. pd.f
[ 7] Corne lli F. Choo sing repu tab le servants in a P2P network[ C] / / Pro ceedings of the Int-1Wo rldW ideW eb Conference. H aw a i:i ACM Press, 2002: 441-449.
[ 8] 冯登国. 密码学原理与实践[M ]. 2版. 北京: 电子工业出版社, 2003: 245-257.
Feng Dengguo. Cryptography and Netwo rk Secur ity: Princ iples and Prac tice[M ] . 2nd ed. Be ijing: E lectron ics Industry Press,2003: 245-257. ( in Ch inese)
[ 9] 关振胜. 公钥基础设施PK I与认证机构CA[M ]. 北京: 电子工业出版社, 2002.
Guan Zhensheng. Pulic Key Infrastructure-PK I and Certifica te Au thor ity-CA[M ]. Beijing: E lectron ics Industry Press, 2002.( in Chinese)