3Keromytis A, Misra V, Rubenstein D. SOS: secure overlay services. In Proceedings of ACM SIGCOMM, Pittsburg, PA,2002.61~72
4Stoica I, Morris R, Karger D, et al. Chord: ascalable peer-to-peer lookup service for internet applications. IEEE/ACM Transactions on Networking(TON), 2003,11(1):17~32
5Xuan D, Chellappan S, Wang X, et al. Analysis of the generalized secur eoverlay services architecture. Proc. ICDCS'04 March, 2004.408~417
6Chu Y, Rao S, Zhang H. A case for end system multicast. In Proceedings of ACM SIGMETRICS, 2000.1~12
7Li J, Reiher P, Popek G. Disseminating security updates at internet scale. Norwell, MA: Kluwer, 2002.174~186
8Jiang Tianfa,Jiang Wei.A Performance Analysis on the Co-operation based INTRANET[J].JOURNAL OF WUHAN UNIVERSITY OF TECHNOLGY(Transportation Science & Engineering)Vol.29 No.2 Dec 2005:319-322.
9hyun lim,soon-yuong Park,Wan-hyun Cho.FPGA Implementation of image watermarking algorithm for a digital camera [M].IEEE 2003:1000-1003.
10Wang Qiang,Jiang Tianfa..STUDY ON WATERMARKING IN JPEG2000 DOMAIN.JOURNAL OF WUHAN UNIVERSITY OF TECHNOLGY[J].(Transportation Science & Engineering)2004,28(5):795-798.