1[1]Yeager W,Williams J. Secure Peer-to-Peer Networking: The JXTA example[J]. IT Pro, vol.4, no.2, Mar./Apr.2002, pp.53-57.
2[2]Dejan Milojicic S, et.al.Peer-to-Peer computing, HP technical report[C]. HPL-2002-57.
3[3]Stefan Saroiu, Krishna Gummadi P, Steven Gribble D.A measurement study of Peer-to-Peer file sharing systems[M]. Proceeding of MMCN2002, Jan 2002.
4[4]http://www.napster.com.
5[5]http://www.gnutella.wego.com.
6[6]Clarke I, Sandberg O, Wiley B, et al. Freenet: A distributed anonymous information storage and retrieval system[J]. ICSI Workshop on Design Issues in Anonymity and Unobservability, July 2000.
7[7]John Kubiatowicz, et.al. OceanStore: An architecture for Global-Scale persistent[J]. Proceedings of the Ninth international conference on architectural supporting for programming languages and operating systems(ASPLOS 2000), November 2000.
8[8]Sullivan W T, et.al.A new major SETI project based on project serendip data and 100 000 personal computers[C]. Proc. of the Fifth Intl. Conf. on Bioastronomy. 1997.
9[9]Bob Doyle.Groove tool development.The O′Reilly Peer-to-Peer and Web services conference[M]. Washington D C, November 5-8, 2001.
10[10]Juan Carlos Soto, Mike Duigou, Nelson Mi-nar. Project JXTA: Introduction and development. The O′Reilly Peer-to-Peer and Web Services Conference[M]. Washington,D C,November 5-8,2001.