[1] |
赵恒,陈杰. P2P技术的应用及其研究现状[J]. 电信快报,2004,(9):39-41.
|
[2] |
Edonkey 2000 Home Page[EB/OL]., 2014-10-28.
|
[3] |
eMule Project[EB/OL]., 2014-10-28.
|
[4] |
eMule中文版[EB/OL]., 2014-10-28.
|
[5] |
aMule Project[EB/OL]., 2014-10-28.
|
[6] |
Mldonkey-the P2P Client for Linux/unix/windows[EB/OL]., 2014-10-28.
|
[7] |
Bickson D, Malkhi D.A study of privacy in file sharing networks[R]. Israel:LeibnizResearch Center, The Hebrew of Jerusalem, Technical Report TR-2003-67, 2003.
|
[8] |
绿盟科技. eMule客户端AttachToAlreadyKnown内存双释放漏洞[EB/OL]. , 2014-08-22.
|
[9] |
刘倚达,施勇,薛质. eMule协议的安全性研究[J]. 计算机工程,2009,35(13):134-136.
|
[10] |
Scarlata V, Levine B, Shield C.Responder Anonymity and anonymous peer-to-peer file sharing[C]//Network Protocols Ninth International Conference on ICNP 2001.Mission Inn, Reverside USA: IEEE Computer Society, 2001:272-280.
|
[11] |
Dingledine R, Freedman M, Molnar D.The free haven project: Distributed anonymous storage service [C]//Designing Privacy Enhancing Technologies. Berkeley, USA: Springer, 2001:67-95.
|
[12] |
Clarke I, Sandberg O, Wiley B, et al.Freenet: A distributed anonymous information storage and retrieval system [C]//Designing Privacy Enhancing Technologies. Berkeley, USA: Springer, 2001:46-66.
|
[13] |
Bennett K, Grothoff C, Horozov T, et al.Gnunet-A truly anonymous networking infrastructure [C]//Privacy Enhancing Technologies workshop. San Francisco, USA: Citeceer, 2002:179-193.
|
[14] |
Memoon G, Rejaie R, Guo Y, et al.Large-scale monitoring of DHT traffic[C]//Proceedings of the 8th International Conference on Peer-to-Peer System. Boston USA:USENIX Association, 2009:1-6.
|
[15] |
刘朝阳,刘丙双. P2P文件共享网络中的用户隐私泄露[J]. 清华大学学报,2012,52(10):1435-1439.
|
[16] |
Davide Cerri, Alessandro Ghioni, Stefano Paraboschi, Simone Tiraboschi.ID Mapping Attacks in P2P Networks[C]//Global Telecommunications Conference, Washington, DC, USA: IEEE, 2005:6-12.
|