1. [1] B. Cohen, “Incentives build robustness in bittorrent,” 1st Workshop on the Economics of Peer-2-Peer Systems, 2003.
2. [2] K. Matsuo, L. Barolli, F. Xhafa, A. Koyama, and A. Durresi, “Implementation of a JXTA-based P2P e-learning system and its performance evaluation,” International Journal of Web Information Systems, vol.4, no.3, pp.352-371, 2008.
3. [3] A. Pfitzmann and M. Hansen, “Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management -a consolidated proposal for terminology,” http://dud.inf.tu-dresden.de/Anon_Terminology.shtml, Feb. 2008. v0.31.
4. [4] M. Iguchi and S. Goto, “Anonymous P2P Web Browse History Sharing for Web Page Recommendation,” IEICE Trans. Inf. & Syst., vol.E90-D, no.9, pp.1343-1353, Sept. 2007.
5. [5] J. Gu, J. Nah, H. Kwon, J. Jang, and S. Park, “Random Visitor: Defense against Identity Attacks in P2P Networks,” IEICE Trans. Inf. & Syst., vol.E91-D, no.4, pp.1058-1073, April 2008.