메뉴 건너뛰기




Volumn 3352, Issue , 2005, Pages 337-350

Controlling spam by secure Internet content selection

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; ELECTRONIC MAIL; NETWORK PROTOCOLS; PROBLEM SOLVING;

EID: 23944479821     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/978-3-540-30598-9_24     Document Type: Conference Paper
Times cited : (6)

References (19)
  • 1
    • 84957714601 scopus 로고
    • Robustness principles for public key protocols
    • Proc. Int'l. Conference on Advances in Cryptology (CRYPTO 95). Springer-Verlag
    • Ross Anderson and Roger Needham. Robustness principles for public key protocols. In Proc. Int'l. Conference on Advances in Cryptology (CRYPTO 95), volume 963 of Lecture Notes in Computer Science, pages 236-247. Springer-Verlag, 1995. http://citeseer.nj.nec.com/article/anderson95robustness.html
    • (1995) Lecture Notes in Computer Science , vol.963 , pp. 236-247
    • Anderson, R.1    Needham, R.2
  • 3
    • 0342287897 scopus 로고    scopus 로고
    • Yang-hua Chu, Brian LaMacchia and Peter Lipp, W3C Recommendation, May
    • Philip DesAutels (Ed.), Yang-hua Chu, Brian LaMacchia and Peter Lipp, PICS Signed Labels (DSig) 1.0 Specification, W3C Recommendation, http://www.w3.org/TR/REC-DSig-label, May 1998.
    • (1998) PICS Signed Labels (DSig) 1.0 Specification
    • DesAutels, P.1
  • 4
    • 33645419615 scopus 로고    scopus 로고
    • Victor Duchovni, John Gilmore, Amir Herzberg, Ben Laurie, Perry Metzger and others, messages to the cryptography@metzdowd.com list , January 2004
    • Victor Duchovni, John Gilmore, Amir Herzberg, Ben Laurie, Perry Metzger and others, messages to the cryptography@metzdowd.com list , January 2004.
  • 5
    • 35248835679 scopus 로고    scopus 로고
    • On memory-bound functions for fighting spam, advances in cryptology - CRYPTO 2003
    • Springer
    • Cynthia Dwork, Andrew Goldberg and Moni Naor, On Memory-Bound Functions for Fighting Spam, Advances in Cryptology - CRYPTO 2003, LNCS 2729, Springer, 2003, pp. 426-444.
    • (2003) LNCS , vol.2729 , pp. 426-444
    • Dwork, C.1    Goldberg, A.2    Naor, M.3
  • 6
    • 84943235829 scopus 로고
    • Pricing via processing or combating junk mail
    • Cynthia Dwork and Moni Naor, Pricing via Processing or Combating Junk Mail, Crypto '92, pp.139-147, 1992.
    • (1992) Crypto '92 , pp. 139-147
    • Dwork, C.1    Naor, M.2
  • 8
    • 8344260802 scopus 로고    scopus 로고
    • chapter 12 in Payment Technologies for E-Commerce, Editor Prof. Weidong Kou, Springer-Verlag, ISBN 3-540-44007-0
    • Amir Herzberg, Micropayments, pp. 245-280, chapter 12 in Payment Technologies for E-Commerce, Editor Prof. Weidong Kou, Springer-Verlag, ISBN 3-540-44007-0, 2003.
    • (2003) Micropayments , pp. 245-280
    • Herzberg, A.1
  • 10
    • 33645386183 scopus 로고    scopus 로고
    • Deterrence measures for spam
    • January
    • Kevin McCurley, Deterrence Measures for Spam, presented at the RSA Conference, January, 1998.
    • (1998) RSA Conference
    • McCurley, K.1
  • 15
    • 33645396769 scopus 로고    scopus 로고
    • Trusted email open standard - A comprehensive policy and technology proposal for email reform
    • May
    • Vincent Schiavone, David Brussin, James Koenig, Stephen Cobb, Ray Everett-Church, Trusted Email Open Standard - A Comprehensive Policy and Technology Proposal for Email Reform, An ePrivacy Group White Paper, available at http://www.eprivacygroup.net/teos/teos_release.pdf, May, 2003.
    • (2003) An EPrivacy Group White Paper
    • Schiavone, V.1    Brussin, D.2    Koenig, J.3    Cobb, S.4    Everett-Church, R.5
  • 17
    • 33645403710 scopus 로고    scopus 로고
    • Technical responses to spam
    • November
    • Technical responses to spam, Taughnnock Networks whitepaper, November 2003.
    • (2003) Taughnnock Networks Whitepaper
  • 18
    • 33645409903 scopus 로고    scopus 로고
    • An overview of E-postage
    • June Updated February 2004
    • An overview of E-Postage, Taughnnock Networks whitepaper, June 2003, Updated February 2004.
    • (2003) Taughnnock Networks Whitepaper


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.