2Klima V, Rosa T. Attack on Private Signature Keys of the OpenPGP Format, PGP (TM) Programs and Other Applications Compatible with OpenPGP[J]. IACR Cryptology ePrint Archive.2002.
3Abdul-Rahman A. The pgp trust model[C]//EDI-Forum: the Journal of Electronic Commerce.1997.
4Whitten A, Tygar J D. Why Johnny Can't Encrypt: A Usability Evaluation ofPGP 5.0[C]//Usenix Security.1999.
5李昌新.存储加密系统中加密和认证机制研究及其实现[J].2011.
6H.Drucker, D Wu, and V.N.Vapnik,Support Vector Machines for Spam Categorization[J].IEEE Transactions on Neural Networks,Vol. 10,No.5,Sep. 1999.
7X Carreras and L.Marquez.Boosting Trees for AntiSpam Email FilteringiAl In Proceedings of: RANLP-01, 4th International Conference on Recent Advances in Natural Lap.guage processing, Sep,2001.