5Castro M. , Druschel P. , Ganesh A. , et al. Security for struc- tured peer-to-peer overlay networks[C]. In: Proceeding of 5th Symposium on Operating Systems Design and Implementation (OSDI 2002), Boston, MA, 2002, 102-115.
6Runfang Zhou, Kai Hwang. PowerTrust: a robust and scal- able reputation system for trusted peer-to-peer computing [J]. IEEE Transactions on Parallel and Distributed Systems, 2007, 18(5): 460-473.
8Ross K. W. , Rubenstein D: Tutorial on P2P systems[EB/ OL]. http://eis, poly. edu/ -ross/papers/ P2Ptutorial Info- com. pdf, 2009-6-2.
9Khaled M. Hammouda and Mohamed S. Kamel. Hierar- chically Distributed Peer-to-Peer Document Clustering and Cluster Summarization [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2009, 21 (5) :681-698.
10Karger D. , Lehman E. , Leighton F. , et al. Consistent bashing and random trees: Distrib-uted caching protocols for relieving hot spots on the world wide web[C]. In: Proceedings of the 29th Annual ACM Symposium on Theory of Computing. Dallas, Tex- as, U.S., ACM Press, 1997, 654-663.