7HURLBUT D. Fuzzy Hashing for Digital Forensic Investigators [EB/OL]. [2010-04-26]. http: //accessdata.com/downloads/media/Fuzzy_ Hashing_for_Investigators.pdf.
8KORNBLUM J. Identifying Almost Identical Files Using Gontext Triggered Piecewise Hashing[J]. Digital Investigation, 2006(3):. 91-97.
9WILLIAM S. Cryplography and Network Security: Principles and Practice[M]. Fourth Edition. [s.l.]: Prentice Hall, 2005.