4HURLBUT D. Fuzzy Hashing for Digital Forensic Investigators [EB/OL]. [2010-04-26]. http: //accessdata.com/downloads/media/Fuzzy_ Hashing_for_Investigators.pdf.
5KORNBLUM J. Identifying Almost Identical Files Using Gontext Triggered Piecewise Hashing[J]. Digital Investigation, 2006(3):. 91-97.
6WILLIAM S. Cryplography and Network Security: Principles and Practice[M]. Fourth Edition. [s.l.]: Prentice Hall, 2005.