[1] Rosenberg J, Schulzrinne H, Camarillo G, et al. SIP: Session Initiation Protocol[S]. RFC 3261, 2002. [2] Bryan D, Lowekamp B, Jennings C. A P2P Approach to SIP Registration and Resource Location[EB/OL]. (2006-04-10). http:// www.ietf.org/internet-drafts/draft-bryan-p2psip-dsip-00.txt. [3] 耿福泉, 高士坤, 赵林亮, 等. 一种适用于P2P-SIP框架的自适应搜索算法[J]. 东北大学学报, 2007, 28(6): 797-800. [4] 刘敏霞, 余 杰, 李 强, 等. 基于改进Kademlia协议的P2PSIP系统研究[J]. 微电子学与计算机, 2010, 27(8): 235-237. [5] Singh A, Ngan T, Druschel P, et al. Eclipse Attacks on Overlay Networks: Threats and Defenses[C]//Proc. of INFOCOM’06. Barcelona, Spain: [s. n.], 2006. [6] Castro M, Druschel P, Ganesh A, et al. Secure Routing for Structured Peer-to-Peer Overlay Networks[C]//Proc. of USENIX Symposium on Operating System Design and Implementation. Boston, USA: [s. n.], 2002. [7] Hildrum K, Kubiatowicz J. Asymptotically Efficient Approaches to Fault-tolerance in Peer-to-Peer Networks[C]//Proc. of the 17th International Symposium on Distributed Computing. Sorrento, Italy: [s. n.], 2003. [8] Dingledine R, Mathewson N, Syverson P. Tor: The Second Generation Onion Router[C]//Proc. of the 13th USENIX Security Symposium. San Diego, USA: [s. n.], 2004. [9] Li Zhuang, Feng Zhou, Ben Zhao, et al. Cashmere: Resilient Anonymous Routing[C]//Proc. of USENIX Symposium on Networked System Design and Implementation. Boston, USA: [s. n.], 2005. [10] 席 菁, 胡 平, 陆建德. 引入不确定性理论的P2P信誉模型研究[J]. 计算机工程, 2009, 35(8): 158-160.
|