How good are our weapons in the spam wars?
暂无分享,去创建一个
[1] Moni Naor,et al. Pricing via Processing or Combatting Junk Mail , 1992, CRYPTO.
[2] Markus Jakobsson,et al. Proofs of Work and Bread Pudding Protocols , 1999, Communications and Multimedia Security.
[3] Shane Hird. Technical Solutions for Controlling Spam , 2002 .
[4] Christian Damsgaard Jensen,et al. Privacy Recovery with Disposable Email Addresses , 2003, IEEE Secur. Priv..
[5] Ben Laurie,et al. \Proof-of-Work" Proves Not to Work , 2004 .
[6] Mark Levene,et al. Spam and the Internet. Is it here to stay or can it be eradicated , 2004 .
[7] Brett Watson,et al. Beyond Identity: Addressing Problems that Persist in an Electronic Mail System with Reliable Sender Identification , 2004, CEAS.
[8] Miranda Mowbray,et al. Email Prioritization: Reducing Delays on Legitimate Mail Caused by Junk Mail , 2004, USENIX Annual Technical Conference, General Track.
[9] Mads Haahr,et al. Personalised, Collaborative Spam Filtering , 2004, CEAS.
[10] Mark Levene,et al. Spam on the Internet: can it be eradicated or is it here to stay? , 2004 .
[11] Brian Whitworth,et al. Spam and the social-technical gap , 2004, Computer.
[12] Calton Pu,et al. Resisting SPAM Delivery by TCP Damping , 2004, CEAS.
[13] Kang Li,et al. Shall We Stop All Unsolicited Email Messages? , 2004, CEAS.
[14] Kartik Gopalan,et al. A Differentiated Message Delivery Architecture to Control Spam , 2005, 11th International Conference on Parallel and Distributed Systems (ICPADS'05).
[15] John R. Levine. Experiences with Greylisting , 2005, CEAS.