U nwanted communication ranges from nuisance (junk mail) to annoyance (telemarketing) to dangerous to the very medium conveying the message (junk fax, obscene or harassing telephone calls). The usefulness of email is seriously threatened by the commercialization of the Internet because it is easier than ever to collect address lists and cheaper than ever to mass-distribute messages. If companies spent as much money sending junk email as they do sending junk physical mail, an established Internet user would likely get more than 100 junk messages per day. Every time a user sends a message to a public newsgroup or list, fills out a Web form, or mails in a product registration card, the server cheaply obtains an email address and usually some indication of the user's interests. This information is then sold to marketing firms that easily automate mass emailings of advertisements , surveys, and other annoyances that cost the user connect time and, worse, valuable attention. More sinister unwanted email is becoming common as well, including harassing and hate mail. The main technique today for avoiding unwanted communication is to restrict the set of people to whom users give their addresses. For example, people pay to avoid having their phone numbers listed; in email, people sometimes maintain multiple email accounts, using different accounts for different purposes , such as commercial vs. personal. This unlisted address approach is expensive and slow to recover from security breaches; if an address is leaked to an adversary, the only alternative is to pay the service provider to change it (often a lengthy process). Once Despite looking like conventional email, a channelized email address and its related agent allow email users to reliably cut off unwanted correspondents.
[1]
Simson L. Garfinkel,et al.
PGP: Pretty Good Privacy
,
1994
.
[2]
Nathaniel S. Borenstein,et al.
Power, Ease of Use and Cooperative Work in a Practical Multimedia Message System
,
1991,
Int. J. Man Mach. Stud..
[3]
염흥렬,et al.
[서평]「Applied Cryptography」
,
1997
.
[4]
Marshall T. Rose,et al.
Post Office Protocol - Version 3
,
1988,
RFC.
[5]
Jonathan B. Postel.
Rfc821: simple mail transfer protocol
,
1982
.
[6]
Irene Greif,et al.
Desktop agents in group-enabled products
,
1994,
CACM.
[7]
Manuel Blum,et al.
A Simple Unpredictable Pseudo-Random Number Generator
,
1986,
SIAM J. Comput..
[8]
Robert J. Hall,et al.
Channels: Avoiding unwanted electronic mail
,
1996,
Network Threats.
[9]
Jon Postel,et al.
Simple Mail Transfer Protocol
,
1981,
RFC.