-
1
-
-
85045893940
-
Moderately hard, memory-bound functions
-
Abadi, M., Burrows, M., Manasse, M. and Wobber, T.: 2003, Moderately Hard, Memory-Bound Functions, Proceedings of the 10th Annual Network and Distributed System Security Symposium, pp. 25-39.
-
(2003)
Proceedings of the 10th Annual Network and Distributed System Security Symposium
, pp. 25-39
-
-
Abadi, M.1
Burrows, M.2
Manasse, M.3
Wobber, T.4
-
2
-
-
33749873539
-
Spam, spam, spam, spam, spam, The FTC and spam
-
Allman, E.: 2003, Spam, Spam, Spam, Spam, Spam, The FTC and Spam, ACM queue 1 (6).
-
(2003)
ACM Queue
, vol.1
, Issue.6
-
-
Allman, E.1
-
3
-
-
84864689993
-
The economics of spam
-
Allman, E.: 2003/2004, The economics of spam, ACM queue 1 (9).
-
(2003)
ACM Queue
, vol.1
, Issue.9
-
-
Allman, E.1
-
4
-
-
33746205199
-
DomainKeys identified mail (DKIM)
-
IETF Network Working Group
-
Allman, E., Callas, J., Delany, M., Libbey, M., Fenton, J. and Thomas, M.: 2005, DomainKeys Identified Mail (DKIM), Internet draft, IETF Network Working Group.
-
(2005)
Internet Draft
-
-
Allman, E.1
Callas, J.2
Delany, M.3
Libbey, M.4
Fenton, J.5
Thomas, M.6
-
5
-
-
3843075559
-
An evaluation of naive bayesian anti-spam filtering
-
G. Potamias, V. Moustakis and M. van Sommeren eds
-
Androutsopoulos, I., Koutsias, J., Chandrinos, K., Paliouas, G. and Vassilakis, C.: 2000, An Evaluation of Naive Bayesian Anti-Spam Filtering, in G. Potamias, V. Moustakis and M. van Sommeren (eds), Proceedings of the 11th European Conference on Machine Learning, pp. 9-17.
-
(2000)
Proceedings of the 11th European Conference on Machine Learning
, pp. 9-17
-
-
Androutsopoulos, I.1
Koutsias, J.2
Chandrinos, K.3
Paliouas, G.4
Vassilakis, C.5
-
6
-
-
0033651407
-
An experimental comparison of naive bayesian and keyword-based anti-spam filtering with personal e-mail messages
-
N. Belkin, P. Inwersen and M. Leong eds
-
Androutsopoulos, I., Koutsias, J., Chandrinos, K. and Spyropoulos, C.: 2000, An Experimental Comparison of Naive Bayesian and Keyword-Based Anti-Spam Filtering with Personal E-mail Messages, in N. Belkin, P. Inwersen and M. Leong (eds), Proceedings of the 23rd ACM SIGIR Conference on Research and Development in Information Retrieval (SI-GIR 2000), p. 160167.
-
(2000)
Proceedings of the 23rd ACM SIGIR Conference on Research and Development in Information Retrieval (SI-GIR 2000)
, pp. 160167
-
-
Androutsopoulos, I.1
Koutsias, J.2
Chandrinos, K.3
Spyropoulos, C.4
-
8
-
-
0043157171
-
Learning to filter spam e-mail: A comparison of a naive bayesian and a memory-based approach
-
H. Zaragoza, P. Gallinari and M. Rajman eds
-
Androutsopoulos, I., Paliouras, G., Karkaletsis, V., Sakkis, G., Spyropoulos, C. and Stamatopoulos, P.: 2000, Learning to Filter Spam E-mail: A Comparison of a Naive Bayesian and a Memory-Based Approach, in H. Zaragoza, P. Gallinari and M. Rajman (eds), 4th European Conference on Principles and Practice of Knowledge Discovery in Databases (PKDD 2000), pp. 1-13.
-
(2000)
4th European Conference on Principles and Practice of Knowledge Discovery in Databases (PKDD 2000)
, pp. 1-13
-
-
Androutsopoulos, I.1
Paliouras, G.2
Karkaletsis, V.3
Sakkis, G.4
Spyropoulos, C.5
Stamatopoulos, P.6
-
9
-
-
84891996366
-
Anti-spam technical alliance technology and policy report
-
Anti-Spam Technical Alliance ASTA
-
Anti-Spam Technical Alliance (ASTA):2004, Anti-spam technical alliance technology and policy report, Technical report.
-
(2004)
Technical Report
-
-
-
11
-
-
7344233220
-
Privacy enhancement for internet electronic mail: Part III: Algorithms, modes, and identifiers
-
IETF Network Working Group
-
Balenson, D.: 1993, Privacy Enhancement for Internet Electronic Mail: Part III: Algorithms, Modes, and Identifiers., RFC 1423, IETF Network Working Group.
-
(1993)
RFC
, vol.1423
-
-
Balenson, D.1
-
13
-
-
84892072994
-
-
Bundesgesetzblatt I, ber. S. 2909 u. Bundesgesetzblatt 2003 S. 738
-
BGB: 2002, Bundesgesetzblatt I S. 42, ber. S. 2909 u. Bundesgesetzblatt 2003 S. 738).
-
(2002)
BGB
, pp. 42
-
-
-
15
-
-
84891978556
-
-
Working paper, presented at the Workshop on the Economics of Information Security WEIS 2006, University of Cambridge
-
Böhme, R. and Holz, T.: 2006, The Effect of Stock Spam on Financial Markets, http://weis2006.econinfosec.org. Working paper, presented at the Workshop on the Economics of Information Security (WEIS) 2006, University of Cambridge.
-
(2006)
The Effect of Stock Spam on Financial Markets
-
-
Böhme, R.1
Holz, T.2
-
16
-
-
0038725192
-
Key words for use in RFCs to indicate requirement levels
-
IETF Network Working Group
-
Bradner, S.: 1997, Key words for use in RFCs to Indicate Requirement Levels, RFC 2119, IETF Network Working Group.
-
(1997)
RFC
, vol.2119
-
-
Bradner, S.1
-
19
-
-
3042719342
-
OpenPGP message format
-
IETF Network Working Group
-
Callas, J., Donnerhacke, L., Finney, H. and Thayer, R.: 1998, OpenPGP Message Format, RFC 2440, IETF Network Working Group.
-
(1998)
RFC
, vol.2440
-
-
Callas, J.1
Donnerhacke, L.2
Finney, H.3
Thayer, R.4
-
21
-
-
84892072001
-
-
CANSPAM Act of 2003:, DEC. 16, 2003
-
CANSPAM Act of 2003:2003, PUBLIC LAW 108187 DEC. 16, 2003.
-
(2003)
Public Law 108187
-
-
-
23
-
-
84892106878
-
The CAUBE. AU spam survey
-
CAUBE. AU: 1999, The CAUBE. AU Spam Survey, Technical report. http://www.caube.org.au/survey.htm.
-
(1999)
Technical Report
-
-
-
25
-
-
19544362523
-
Spam filtering using a markov random field model with variable weighting schemas
-
Chhabra, S., Yerazunis, W. and Siefkes, C.: 2004, Spam Filtering using a Markov Random Field Model with Variable Weighting Schemas, Proceedings of the 4th IEEE International Conference on Data Mining, pp. 347-350.
-
(2004)
Proceedings of the 4th IEEE International Conference on Data Mining
, pp. 347-350
-
-
Chhabra, S.1
Yerazunis, W.2
Siefkes, C.3
-
29
-
-
84892067047
-
-
Commtouch: 2006, Spam statistics, http://www.commtouch.com/Site/ ResearchLab/statistics.asp.
-
(2006)
Spam Statistics
-
-
-
30
-
-
0032131717
-
Spam!
-
Cranor, L. F. and LaMacchia, B. A.: 1998, Spam!, Communications of the ACM 41(9), 74-83.
-
(1998)
Communications of the ACM
, vol.41
, Issue.9
, pp. 74-83
-
-
Cranor, L.F.1
La Macchia, B.A.2
-
33
-
-
77951910738
-
Certified server validation (CSV)
-
IETF Network Working Group
-
Crocker, D., Leslie, J. and Otis, D.: 2005, Certified Server Validation (CSV), Internet draft, IETF Network Working Group.
-
(2005)
Internet Draft
-
-
Crocker, D.1
Leslie, J.2
Otis, D.3
-
34
-
-
10444284672
-
Augmented BNF for syntax specifications: ABNF
-
IETF Network Working Group
-
Crocker, D. and Overell, P.: 1997, Augmented BNF for Syntax Specifications: ABNF, RFC 2234, IETF Network Working Group.
-
(1997)
RFC
, vol.2234
-
-
Crocker, D.1
Overell, P.2
-
35
-
-
13244267079
-
P2p-based collaborative spam detection and filtering
-
Damiani, E., De Capitani Di Vimercati, S., Paraboschi, S. and Samarati, P.: 2004, P2p-based collaborative spam detection and filtering, Proceedings of the Fourth International Conference on Peer-to-Peer Computing, pp. 176-183.
-
(2004)
Proceedings of the Fourth International Conference on Peer-to-peer Computing
, pp. 176-183
-
-
Damiani, E.1
De Capitani Di Vimercati, S.2
Paraboschi, S.3
Samarati, P.4
-
36
-
-
33746235590
-
The RMX DNS RR and method for lightweight SMTP sender authorization
-
IETF Network Working Group
-
Danish, H.: 2004, The RMX DNS RR and method for lightweight SMTP sender authorization, Internet draft, IETF Network Working Group.
-
(2004)
Internet Draft
-
-
Danish, H.1
-
37
-
-
84892001711
-
Smtp service extension for remote message queue starting
-
IETF Network Working Group
-
De Winter, J.: 1996, Smtp Service Extension for Remote Message Queue Starting, RFC 2818, IETF Network Working Group.
-
(1996)
RFC
, vol.2818
-
-
De Winter, J.1
-
39
-
-
84892049721
-
Lightweight MTA authentication protocol (LMAP) discussion and applicability statement
-
IETF Network Working Group
-
DeKok, A.: 2004, Lightweight MTA Authentication Protocol (LMAP) Discussion and Applicability Statement, Internet draft, IETF Network Working Group.
-
(2004)
Internet Draft
-
-
De Kok, A.1
-
40
-
-
51749091237
-
Domain-based email authentication using public-keys advertised in the DNS (DomainKeys)
-
IETF Network Working Group
-
Delany, M.: 2005, Domain-based Email Authentication Using Public-Keys Advertised in the DNS (DomainKeys), Internet draft, IETF Network Working Group.
-
(2005)
Internet Draft
-
-
Delany, M.1
-
42
-
-
33750582261
-
-
Official Journal of the European Communities
-
Directive 2002/58/EC: 2002, Official Journal of the European Communities, L 201/37.
-
(2002)
Directive 2002/58/EC
-
-
-
43
-
-
84892123453
-
-
n. d.
-
Doll, J.: n. d., Spam Attack, http://www.joes.com/spammed.html.
-
Spam Attack
-
-
Doll, J.1
-
45
-
-
55849102000
-
An artificial neural network spam classifier
-
Drawes, R.: 2002, An artificial neural network spam classifier, Technical report. www.interstice.com/drewes/cs676/spam-nn/spam-nn.html.
-
(2002)
Technical Report
-
-
Drawes, R.1
-
46
-
-
0032594950
-
Support vector machines for spam categorization
-
Drucker, H., Wu, D. and Vladimir N. Vapnik: 1999, Support Vector Machines for Spam Categorization, IEEE Transactions on Neural Networks 10(5), 1048-1054.
-
(1999)
IEEE Transactions on Neural Networks
, vol.10
, Issue.5
, pp. 1048-1054
-
-
Drucker, H.1
Wu, D.2
Vapnik, V.N.3
-
47
-
-
35248835679
-
On memory-bound functions for fighting spam
-
D. Boneh ed., Springer
-
Dwork, C., Goldberg, A. and Naor, M.: 2003, On Memory-Bound Functions for Fighting Spam, in D. Boneh (ed.), Proceedings of the 23rd Annual International Cryptology Conference (CRYPTO 2003), number 2729 in LNCS, Springer, pp. 426-444.
-
(2003)
Proceedings of the 23rd Annual International Cryptology Conference (CRYPTO 2003), Number 2729 in LNCS
, pp. 426-444
-
-
Dwork, C.1
Goldberg, A.2
Naor, M.3
-
48
-
-
0001126172
-
Procing via processing or combatting junk mail
-
D. Boneh ed., Springer
-
Dwork, C. and Naor, M.: 2002, Procing via Processing or Combatting Junk Mail, in D. Boneh (ed.), Proceedings of the 22rd Annual International Cryptology Conference (CRYPTO 2002), number 740 in LNCS, Springer, pp. 137-147.
-
(2002)
Proceedings of the 22rd Annual International Cryptology Conference (CRYPTO 2002), Number 740 in LNCS
, pp. 137-147
-
-
Dwork, C.1
Naor, M.2
-
50
-
-
84892016318
-
Project lumos: A solutions blueprint for solving the spam problem by establishing volume email sender accountability
-
Email Service Provider Coalition
-
Email Service Provider Coalition: 2003, Project Lumos: A Solutions Blueprint for Solving the Spam Problem by Establishing Volume Email Sender Accountability, Technical report.
-
(2003)
Technical Report
-
-
-
51
-
-
84892135920
-
Cooperation procedure concerning the transmission of complaint information and intelligence relevant to the enforcement of article 13 of the privacy and electronic communication directive 2002/58/EC
-
EU:, or
-
EU: 2004, Cooperation Procedure Concerning the Transmission of Complaint Information and Intelligence Relevant to the Enforcement of Article 13 of the Privacy and Electronic Communication Directive 2002/58/EC, or Any Other Applicable National Law Pertaining to the Use of Unsolicited Electronic Communications.
-
(2004)
Any Other Applicable National Law Pertaining to the use of Unsolicited Electronic Communications
-
-
-
52
-
-
33947683962
-
-
Evett, D.: 2006, Spam Statistics 2006, http://spam-filterreview. toptenreviews.com/spam-statistics.html.
-
(2006)
Spam Statistics 2006
-
-
Evett, D.1
-
53
-
-
3242763586
-
Selling interrupt rights: A way to control unwanted e-mail and telephone calls
-
Fahmann, S.: 2002, Selling interrupt rights: A way to control unwanted e-mail and telephone calls, IBM Systems Journal 41(4), 759-766.
-
(2002)
IBM Systems Journal
, vol.41
, Issue.4
, pp. 759-766
-
-
Fahmann, S.1
-
54
-
-
84892012797
-
Designated mailers protocol
-
IETF Network Working Group
-
Fecyk, G.: 2003, Designated Mailers Protocol, Internet draft, IETF Network Working Group.
-
(2003)
Internet Draft
-
-
Fecyk, G.1
-
58
-
-
84891998209
-
SMTP service extension for returning enhanced error codes
-
IETF Network Working Group
-
Freed, N.: 1996, SMTP Service Extension for Returning Enhanced Error Codes, RFC 2034, IETF Network Working Group.
-
(1996)
RFC
, vol.2034
-
-
Freed, N.1
-
59
-
-
84883148577
-
SMTP service extension for command pipelining
-
IETF Network Working Group
-
Freed, N.: 2000, SMTP Service Extension for Command Pipelining, RFC 2920, IETF Network Working Group.
-
(2000)
RFC
, vol.2920
-
-
Freed, N.1
-
60
-
-
0003290654
-
Multipurpose internet mail extensions (MIME) part five: Conformance criteria and examples
-
IETF Network Working Group
-
Freed, N. and Borenstein, N.: 1996a, Multipurpose Internet Mail Extensions (MIME) Part Five: Conformance Criteria and Examples, RFC 2049, IETF Network Working Group.
-
(1996)
RFC
, vol.2049
-
-
Freed, N.1
Borenstein, N.2
-
61
-
-
0003290654
-
Multipurpose internet mail extensions (MIME) part one: Format of internet message bodies
-
IETF Network Working Group
-
Freed, N. and Borenstein, N.: 1996b, Multipurpose Internet Mail Extensions (MIME) Part One: Format of Internet Message Bodies, RFC 2045, IETF Network Working Group.
-
(1996)
RFC
, vol.2045
-
-
Freed, N.1
Borenstein, N.2
-
62
-
-
0009398304
-
Multipurpose internet mail extensions (mime) part two: Media types
-
IETF Network Working Group
-
Freed, N. and Borenstein, N.: 1996c, Multipurpose internet mail extensions (mime) part two: Media types, RFC 2046, IETF Network Working Group.
-
(1996)
RFC
, vol.2046
-
-
Freed, N.1
Borenstein, N.2
-
63
-
-
0008626109
-
Multipurpose internet mail extensions (MIME) part four: Registration procedures
-
IETF Network Working Group
-
Freed, N., Klensin, J. and Postel, J.: 1996, Multipurpose Internet Mail Extensions (MIME) Part Four: Registration Procedures, RFC 2048, IETF Network Working Group.
-
(1996)
RFC
, vol.2048
-
-
Freed, N.1
Klensin, J.2
Postel, J.3
-
64
-
-
0003229196
-
The SSL protocol version 3.0
-
IETF Network Working Group
-
Freier, A. O., Karlton, P. and Kocher, P. C.: 1996, The SSL Protocol Version 3.0, Internet draft, IETF Network Working Group.
-
(1996)
Internet Draft
-
-
Freier, A.O.1
Karlton, P.2
Kocher, P.C.3
-
65
-
-
84892132377
-
Email address harvesting: How spammers reap what you sow
-
FTC: 2002, Email Address Harvesting: How Spammers Reap What You Sow, Technical report. http://www.ftc.gov/bcp/conline/pubs/alerts/spamalrt.htm.
-
(2002)
Technical Report
-
-
-
66
-
-
84892038397
-
National do not email registry a report to congress
-
FTC
-
FTC: 2004, National Do Not Email Registry A Report to Congress, Technical report.
-
(2004)
Technical Report
-
-
-
67
-
-
84892006063
-
Email address harvesting and the effectiveness of anti-spam filters
-
FTC
-
FTC: 2005, Email Address Harvesting and the Effectiveness of Anti-Spam Filters, Technical report.
-
(2005)
Technical Report
-
-
-
68
-
-
84958036480
-
Curbing junk e-mai via secure classification
-
Gabber, E., Jakobsson, M., Matias, Y. and Mayer, A. J.: 1998, Curbing Junk E-Mai via Secure Classification, Proceedings of the Second International Conference on Financial Cryptography, pp. 198-213.
-
(1998)
Proceedings of the Second International Conference on Financial Cryptography
, pp. 198-213
-
-
Gabber, E.1
Jakobsson, M.2
Matias, Y.3
Mayer, A.J.4
-
69
-
-
3042823619
-
Email-based identification and authentication: An alternative to PKI?
-
Garfinkel, S.: 2003, Email-Based Identification and Authentication: An Alternative to PKI?, IEEE Security & Privacy 1(6), 20-26.
-
(2003)
IEEE Security & Privacy
, vol.1
, Issue.6
, pp. 20-26
-
-
Garfinkel, S.1
-
71
-
-
29544447597
-
Fighting the spam wars, A remailer approach with restrictive aliasing
-
Gburzynski, P. and Maitan, J.: 2004, Fighting the spam wars, A remailer approach with restrictive aliasing, ACM Trans. Inter. Tech. 4(1), 1-30.
-
(2004)
ACM Trans. Inter. Tech
, vol.4
, Issue.1
, pp. 1-30
-
-
Gburzynski, P.1
Maitan, J.2
-
72
-
-
0142192175
-
Message submission
-
IETF Network Working Group
-
Gellens, R. and Klensin, J.: 1998, Message Submission, RFC 2476, IETF Network Working Group.
-
(1998)
RFC
, vol.2476
-
-
Gellens, R.1
Klensin, J.2
-
73
-
-
0003355701
-
Hypertext transfer protocol - HTTP/1.1
-
IETF Network Working Group
-
Gettys, J., Mogul, J., Frystyk, H., Masinter, L. and Leach, P.: 1999, Hypertext Transfer Protocol - HTTP/1.1, RFC 2616, IETF Network Working Group.
-
(1999)
RFC
, vol.2616
-
-
Gettys, J.1
Mogul, J.2
Frystyk, H.3
Masinter, L.4
Leach, P.5
-
78
-
-
33845519182
-
SMTP service extension for secure SMTP over transport layer security
-
IETF Network Working Group
-
Hoffman, P.: 2002, SMTP Service Extension for Secure SMTP over Transport Layer Security, RFC 3207, IETF Network Working Group.
-
(2002)
RFC
, vol.3207
-
-
Hoffman, P.1
-
79
-
-
84892116328
-
New sTLD RFP application. Mail, Part B. Application form
-
ICANN
-
ICANN: 2004, new sTLD RFP Application. mail, Part B. Application Form, Technical report.
-
(2004)
Technical Report
-
-
-
81
-
-
84892138484
-
Email Spamming (include scam)
-
InfoSec
-
InfoSec: 2004, Email Spamming (include scam), Technical report.
-
(2004)
Technical Report
-
-
-
82
-
-
84892057232
-
-
Internet Assigned Numbers Authority (IANA):2002, MIME Media Types. http://www.iana.org/assignments/media-types/index.html.
-
(2002)
MIME Media Types
-
-
-
86
-
-
84891984078
-
A comparative analysis of spam laws: The quest for a model law
-
ITU:, Geneva, Switzerland, 28 JUNE 1 JULY 2005
-
ITU: 2005a, A Comparative Analysis of Spam Laws: The Quest for a Model Law, Background Paper for the ITU WSIS Thematic Meeting on Cybersecurity, Geneva, Switzerland, 28 JUNE 1 JULY 2005.
-
(2005)
Background Paper for the ITU WSIS Thematic Meeting on Cybersecurity
-
-
-
89
-
-
20444481896
-
Privacy enhancement for internet electronic mail: Part IV: Key certification and related services
-
IETF Network Working Group
-
Kaliski, B.: 1993, Privacy Enhancement for Internet Electronic Mail: Part IV: Key Certification and Related Services, RFC 1424, IETF Network Working Group.
-
(1993)
RFC
, vol.1424
-
-
Kaliski, B.1
-
90
-
-
11244317367
-
A policy driven approach to email services
-
Kaushik, S., Ammann, P., Wijesekera, D., Winsborough, W. and Ritchey, R.: 2004, A Policy Driven Approach to Email Services, Proceedings of IEEE 5th International Workshop on Policies for Distributed Systems and Networks (Policy 2004).
-
(2004)
Proceedings of IEEE 5th International Workshop on Policies for Distributed Systems and Networks (Policy 2004)
-
-
Kaushik, S.1
Ammann, P.2
Wijesekera, D.3
Winsborough, W.4
Ritchey, R.5
-
91
-
-
0003368492
-
Privacy enhancement for internet electronic mail: Part II: Certificate-based key management
-
IETF Network Working Group
-
Kent, S.: 1993, Privacy Enhancement for Internet Electronic Mail: Part II: Certificate-Based Key Management, RFC 1422, IETF Network Working Group.
-
(1993)
RFC
, vol.1422
-
-
Kent, S.1
-
92
-
-
0344937028
-
SMTP service extensions
-
IETF Network Working Group
-
Klensin, G., Freed, N., Rose, M., Stefferud, E. and Crocker, D.: 1995, SMTP Service Extensions, RFC 1893, IETF Network Working Group.
-
(1995)
RFC
, vol.1893
-
-
Klensin, G.1
Freed, N.2
Rose, M.3
Stefferud, E.4
Crocker, D.5
-
93
-
-
3042776945
-
Simple mail transfer protocol
-
IETF Network Working Group
-
Klensin, J.: 2001, Simple Mail Transfer Protocol, RFC 2821, IETF Network Working Group.
-
(2001)
RFC
, vol.2821
-
-
Klensin, J.1
-
94
-
-
84862402375
-
Anti-spam-gesetze
-
Köcher, J.: 2004, Anti-spam-gesetze, DFN Mitteilungen (64-3), 29-30.
-
(2004)
DFN Mitteilungen
, vol.64
, Issue.3
, pp. 29-30
-
-
Köcher, J.1
-
96
-
-
84892065414
-
META signatures (message enhancements for transmission authorization)
-
Leibzon, W.: 2005b, META Signatures (Message Enhancements for Transmission Authorization), Technical report. http://www.metasignatures.org/ meta signatures protocol.htm.
-
(2005)
Technical Report
-
-
Leibzon, W.1
-
97
-
-
77951889461
-
Bounce address tag validation (BATV)
-
IETF Network Working Group
-
Levine, J., Crocker, D., Silberman, S. and Finch, T.: 2004, Bounce Address Tag Validation (BATV), Internet draft, IETF Network Working Group.
-
(2004)
Internet Draft
-
-
Levine, J.1
Crocker, D.2
Silberman, S.3
Finch, T.4
-
98
-
-
22544435777
-
Anti-spam recommendations for SMTP MTAs
-
IETF Network Working Group
-
Lindberg, G.: 1999, Anti-Spam Recommendations for SMTP MTAs, RFC 2505, IETF Network Working Group.
-
(1999)
RFC
, vol.2505
-
-
Lindberg, G.1
-
100
-
-
2342576505
-
Privacy enhancement for internet electronic mail: Part I: Message encryption and authentication procedures
-
IETF Network Working Group
-
Linn, J.: 1993, Privacy Enhancement for Internet Electronic Mail: Part I: Message Encryption and Authentication Procedures, RFC 1421, IETF Network Working Group.
-
(1993)
RFC
, vol.1421
-
-
Linn, J.1
-
101
-
-
11244253365
-
Information asymmetry and thwarting spam
-
University of Michigan
-
Loder, T., Van Alstyne, M. and Walsh, R.: 2004, Information Asymmetry and Thwarting Spam, Technical report, University of Michigan.
-
(2004)
Technical Report
-
-
Loder, T.1
Van Alstyne, M.2
Walsh, R.3
-
102
-
-
84892073682
-
Purported responsible address in e-mail messages
-
IETF Network Working Group
-
Lyon, J.: 2005, Purported Responsible Address in E-Mail Messages, Internet draft, IETF Network Working Group.
-
(2005)
Internet Draft
-
-
Lyon, J.1
-
103
-
-
33645409324
-
Sender ID: Authenticating E-Mail
-
IETF Network Working Group
-
Lyon, J. and Wong, M.: 2005, Sender ID: Authenticating E-Mail, Internet draft, IETF Network Working Group.
-
(2005)
Internet Draft
-
-
Lyon, J.1
Wong, M.2
-
104
-
-
84891981961
-
-
May 2006
-
MessageLabs: 2006, MessageLabs Intelligence Report: Spam Intercepts Timeline May 2006, http://www.messagelabs.com/publishedcontent/publish/threat watch dotcom en/threat statistics/spam intercepts/DA 114633.chp.html.
-
(2006)
MessageLabs Intelligence Report: Spam Intercepts Timeline
-
-
-
105
-
-
8344277424
-
A multiagent-based peerto-peer network in java for distributed spam filtering
-
V. Mark, J. Mller and M. Pechoucek eds
-
Metzger, J., Schillo, M. and Fischer, K.: 2003, A Multiagent-Based Peerto-Peer Network in Java for Distributed Spam Filtering, in V. Mark, J. Mller and M. Pechoucek (eds), Proceedings of the 3rd International Workshop of Central and Eastern Europe on Multi-Agent Systems (CEEMAS), pp. 616-625.
-
(2003)
Proceedings of the 3rd International Workshop of Central and Eastern Europe on Multi-agent Systems (CEEMAS)
, pp. 616-625
-
-
Metzger, J.1
Schillo, M.2
Fischer, K.3
-
106
-
-
84892008078
-
-
Microsoft
-
Microsoft: 2004, Email Postmarks.
-
(2004)
Email Postmarks
-
-
-
107
-
-
0003334746
-
Domain names - Concepts and facilities
-
IETF Network Working Group
-
Mockapetris, P.: 1987a, Domain names - concepts and facilities, RFC 1034, IETF Network Working Group.
-
(1987)
RFC
, vol.1034
-
-
Mockapetris, P.1
-
108
-
-
0003324905
-
Domain names - Implementation and specification
-
IETF Network Working Group
-
Mockapetris, P.: 1987b, Domain names - implementation and specification, RFC 1035, IETF Network Working Group.
-
(1987)
RFC
, vol.1035
-
-
Mockapetris, P.1
-
109
-
-
0345121529
-
MIME (multipurpose internet mail extensions) part three: Message header extensions for non-ASCII text
-
IETF Network Working Group
-
Moore, K.: 1996, MIME (Multipurpose Internet Mail Extensions) Part Three: Message Header Extensions for Non-ASCII Text, RFC 2047, IETF Network Working Group.
-
(1996)
RFC
, vol.2047
-
-
Moore, K.1
-
112
-
-
53349129341
-
Local mail transfer protocol
-
IETF Network Working Group
-
Myers, J.: 1996, Local Mail Transfer Protocol, RFC 2033, IETF Network Working Group.
-
(1996)
RFC
, vol.2033
-
-
Myers, J.1
-
113
-
-
4243109318
-
Simple authentication and security layer (SASL)
-
IETF Network Working Group
-
Myers, J.: 1997, Simple Authentication and Security Layer (SASL), RFC 2222, IETF Network Working Group.
-
(1997)
RFC
, vol.2222
-
-
Myers, J.1
-
114
-
-
2542456377
-
SMTP service extension for authentication
-
IETF Network Working Group
-
Myers, J.: 1999, SMTP Service Extension for Authentication, RFC 2554, IETF Network Working Group.
-
(1999)
RFC
, vol.2554
-
-
Myers, J.1
-
115
-
-
0012359238
-
Post office protocol - Version 3
-
IETF Network Working Group
-
Myers, J. and Rose, M.: 1996, Post office protocol - version 3, RFC 1939, IETF Network Working Group.
-
(1996)
RFC
, vol.1939
-
-
Myers, J.1
Rose, M.2
-
116
-
-
84892008716
-
The model primary content type for multipurpose internet mail extensions
-
IETF Network Working Group
-
Nelson, S. and Parks, C.: 1997, The Model Primary Content Type for Multipurpose Internet Mail Extensions, RFC 2077, IETF Network Working Group.
-
(1997)
RFC
, vol.2077
-
-
Nelson, S.1
Parks, C.2
-
117
-
-
84892048474
-
Deliver by SMTP service extension
-
IETF Network Working Group
-
Newman, D.: 2000, Deliver By SMTP Service Extension, RFC 2852, IETF Network Working Group.
-
(2000)
RFC
, vol.2852
-
-
Newman, D.1
-
118
-
-
84892067223
-
The spam problem and how it can be countered an interim report by NOIE
-
NOIE
-
NOIE: 2002, The Spam Problem and How it Can be Countered An Interim Report by NOIE, Technical report.
-
(2002)
Technical Report
-
-
-
119
-
-
84892086961
-
Final report of the NOIE review of the spam problem and how it can be countered
-
NOIE: 2003, Final Report of the NOIE Review of the Spam Problem and How It Can Be Countered, Technical report. www.noie.gov. au/publications/NOIE/spam/ final report/SPAMreport.pdf.
-
(2003)
Technical Report
-
-
-
121
-
-
33750990173
-
Spam Filters: Bayes vs. Chi-squared; Letters vs. Words
-
Trinity College Dublin
-
O'Brien, C. and Vogel, C.: 2003, Spam Filters: Bayes vs. Chi-squared; Letters vs. Words, Technical Report TCD-CS-2003-13, Trinity College Dublin.
-
(2003)
Technical Report TCD-cs-2003-13
-
-
O'Brien, C.1
Vogel, C.2
-
129
-
-
84904816397
-
Client SMTP Authorization (CSA)
-
IETF Network Working Group
-
Otis, D., Crocker, D. and Leslie, J.: 2005, Client SMTP Authorization (CSA), Internet draft, IETF Network Working Group.
-
(2005)
Internet Draft
-
-
Otis, D.1
Crocker, D.2
Leslie, J.3
-
130
-
-
84891969384
-
Common internet message headers
-
IETF Network Working Group
-
Palme, J.: 1997, Common Internet Message Headers, RFC 2076, IETF Network Working Group.
-
(1997)
RFC
, vol.2076
-
-
Palme, J.1
-
131
-
-
84892105896
-
Common internet message header fields
-
IETF Network Working Group
-
Palme, J.: 2002, Common Internet Message Header Fields, Internet draft, IETF Network Working Group.
-
(2002)
Internet Draft
-
-
Palme, J.1
-
133
-
-
0346871253
-
Mail routing and the domain system
-
IETF Network Working Group
-
Partridge, C.: 1986, Mail Routing and the Domain System, RFC 2183, IETF Network Working Group.
-
(1986)
RFC
, vol.2183
-
-
Partridge, C.1
-
134
-
-
79954571700
-
On the junk mail problem
-
IETF Network Working Group
-
Postel, J.: 1975, On the Junk Mail Problem, RFC 706, IETF Network Working Group.
-
(1975)
RFC
, vol.706
-
-
Postel, J.1
-
135
-
-
0003260540
-
Simple mail transfer protocol
-
IETF Network Working Group. obsoleted by RFC 2821
-
Postel, J. B.: 1982, Simple Mail Transfer Protocol, RFC 821, IETF Network Working Group. obsoleted by RFC 2821.
-
(1982)
RFC
, vol.821
-
-
Postel, J.B.1
-
136
-
-
84904819430
-
Understanding how spammers steal your e-mail address: An analysis of the first six month of data from project honey pot
-
Prince, M., Holloway, L., Langheinrich, E., Dahl, B. and Keller, A.: 2005, Understanding How Spammers Steal your E-Mail Address: An Analysis of the First Six Month of Data from Project Honey Pot, Proceedings of the Second Conference on Email and Anti-Spam (CEAS). www.ceas.cc/papers-2005/163.pdf.
-
(2005)
Proceedings of the Second Conference on Email and Anti-spam (CEAS)
-
-
Prince, M.1
Holloway, L.2
Langheinrich, E.3
Dahl, B.4
Keller, A.5
-
137
-
-
8344223268
-
Naive-Bayes vs. Rule-Learning in Classification of Email
-
Department of Computer Science, The University of Texas at Austin
-
Provost, J.: 1999, Naive-Bayes vs. Rule-Learning in Classification of Email, Technical Report AI-TR-99-284, Department of Computer Science, The University of Texas at Austin.
-
(1999)
Technical Report AI-tr-99-284
-
-
Provost, J.1
-
139
-
-
21644484073
-
Secure/multipurpose internet mail extensions (S/MIME) version 3.1 message specification
-
IETF Network Working Group
-
Ramsdell, B.: 2004, Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 3.1 Message Specification, RFC 3851, IETF Network Working Group.
-
(2004)
RFC
, vol.3851
-
-
Ramsdell, B.1
-
141
-
-
0003821858
-
HTTP Over TLS
-
IETF Network Working Group
-
Rescorla, E.: 2000, HTTP Over TLS, RFC 2818, IETF Network Working Group.
-
(2000)
RFC
, vol.2818
-
-
Rescorla, E.1
-
142
-
-
0009349822
-
Internet message format
-
IETF Network Working Group
-
Resnick, P.: 2001, Internet Message Format, RFC 2822, IETF Network Working Group.
-
(2001)
RFC
, vol.2822
-
-
Resnick, P.1
-
143
-
-
0009304541
-
A bayesian approach to filtering junk e-mail
-
Sahami, M., Dumais, S., Heckerman, D. and Horvitz, E.: 1998, A Bayesian Approach to Filtering Junk E-Mail, Proceedings of AAAI-98 Workshop on Learning for Text Categorization.
-
(1998)
Proceedings of AAAI-98 Workshop on Learning for Text Categorization
-
-
Sahami, M.1
Dumais, S.2
Heckerman, D.3
Horvitz, E.4
-
147
-
-
84892086328
-
A scalable and flexible infrastructure framework for addressing spam
-
Schryen, G.: 2004a, A Scalable and Flexible Infrastructure Framework for Addressing Spam, Proceedings of IPSI International Conference on Advances in the Internet, Processing, Systems, and Interdisciplinary Res ea rc h.
-
(2004)
Proceedings of IPSI International Conference on Advances in the Internet, Processing, Systems, and Interdisciplinary Research
-
-
Schryen, G.1
-
149
-
-
4243111704
-
Effektivität von Lösungsansätzen zur Bekämpfung von Spam
-
Schryen, G.: 2004c, Effektivität von Lösungsansätzen zur Bekämpfung von Spam, Wirtschaftsinformatik 46(4), 281-288.
-
(2004)
Wirtschaftsinformatik
, vol.46
, Issue.4
, pp. 281-288
-
-
Schryen, G.1
-
151
-
-
33745454337
-
An e-mail honeypot addressing spammers' behavior in collecting and applying addresses
-
Schryen, G.: 2005, An e-mail honeypot addressing spammers' behavior in collecting and applying addresses, Proceedings of the 6th IEEE Information Assurance Workshop, pp. 37-41.
-
(2005)
Proceedings of the 6th IEEE Information Assurance Workshop
, pp. 37-41
-
-
Schryen, G.1
-
153
-
-
77951931441
-
Anti-spam legislation: An analysis of laws and their effectiveness
-
Schryen, G.: 2007a, Anti-spam legislation: An analysis of laws and their effectiveness, Information and Communications Technology Law 1 (16).
-
(2007)
Information and Communications Technology Law
, vol.1
, Issue.16
-
-
Schryen, G.1
-
155
-
-
84888305837
-
Do anti-spam measures cover the e-mail communication network? A formal approach
-
accepted for publication
-
Schryen, G.: 2007c, Do anti-spam measures cover the e-mail communication network? A formal approach, The Journal of Information Systems Security. accepted for publication.
-
(2007)
The Journal of Information Systems Security
-
-
Schryen, G.1
-
156
-
-
84892093234
-
Preventing E-mail spam: The conceptualization and the analysis of an infrastructure framework
-
RWTH Aachen University, Faculty of Business and Economics
-
Schryen, G.: 2007d, Preventing E-mail Spam: The Conceptualization and the Analysis of an Infrastructure Framework, Technical Report 07/01, RWTH Aachen University, Faculty of Business and Economics.
-
(2007)
Technical Report 07/01
-
-
Schryen, G.1
-
157
-
-
34447501834
-
The impact that placing email addresses on the internet has on the receipt of spam
-
accepted for publication
-
Schryen, G.: 2007e, The Impact that Placing Email Addresses on the Internet has on the Receipt of Spam, Computers and Security. accepted for publication.
-
(2007)
Computers and Security
-
-
Schryen, G.1
-
158
-
-
84892032405
-
Appropriateness of lightweight MTA authentication protocols for fighting spam
-
Schryen, G. and Hoven, R.: 2004, Appropriateness of Lightweight MTA Authentication Protocols for Fighting Spam, Proceedings of IPSI International Conference on Advances in the Internet, Processing, Systems, and Interdisciplinary Research.
-
(2004)
Proceedings of IPSI International Conference on Advances in the Internet, Processing, Systems, and Interdisciplinary Research
-
-
Schryen, G.1
Hoven, R.2
-
159
-
-
32144464023
-
Neue Kooperationen und rechtliche Entwicklungen im Kampf gegen Spam
-
Sester, P. and Mutschler, S.: 2006, Neue Kooperationen und rechtliche Entwicklungen im Kampf gegen Spam, Informatik-Spektrum 29(1), 14-22.
-
(2006)
Informatik-spektrum
, vol.29
, Issue.1
, pp. 14-22
-
-
Sester, P.1
Mutschler, S.2
-
160
-
-
84892041456
-
-
Sophos: 2005a, CAN-SPAM Act can do better, http://www.sophos.com/ pressoffice/news/articles/2005/12/canspam05.html.
-
(2005)
CAN-SPAM Act Can do Better
-
-
-
161
-
-
84892113512
-
-
Sophos: 2005b, Sophos Security Threat Management Report, http://www.sophos.com/sophos/docs/eng/marketing material/SophosSecurityReport 2005.pdf.
-
(2005)
Sophos Security Threat Management Report
-
-
-
165
-
-
84874175563
-
-
n. d.
-
Spamhaus: n. d., The Definition of Spam, http://www.spamhaus.org/ definition.html.
-
The Definition of Spam
-
-
-
167
-
-
84892090131
-
-
Bundesgetztblatt I
-
Strafgesetzbuch: 1998, Bundesgetztblatt I S. 3322.
-
(1998)
Strafgesetzbuch
, pp. 3322
-
-
-
168
-
-
84891986040
-
Marking mail transfer agents in reverse DNS with TXT RRs
-
IETF Network Working Group
-
Stumpf, M. and Hoehne, S.: 2005, Marking Mail Transfer Agents in Reverse DNS with TXT RRs, Internet draft, IETF Network Working Group.
-
(2005)
Internet Draft
-
-
Stumpf, M.1
Hoehne, S.2
-
169
-
-
84892093854
-
-
Symantec: 2006, Spam-Statistiken, http://www.symantec.com/region/de/ PressCenter/spam.html.
-
(2006)
Spam-statistiken
-
-
-
171
-
-
84891973130
-
-
n. d.a
-
Templeton, B.: n. d.a, E-stamps, http://www.templetons.com/brad/spam/ estamps.html.
-
E-stamps
-
-
Templeton, B.1
-
174
-
-
84891982405
-
-
n. d.
-
The Government of Hongkong: n. d., Nigerian letters, http://www.info.gov. hk/police/pda/con-tricks/con7.htm.
-
Nigerian Letters
-
-
-
178
-
-
84892009666
-
-
THE LONDON ACTION PLAN On International Spam Enforcement Cooperation: 2004, http://www.londonactionplan.org.
-
(2004)
-
-
-
179
-
-
3042844664
-
Giving E-mail back to the users: Using digital signatures to solve the spam problem
-
Tompkins, T. and Handley, D.: 2003, Giving E-mail Back to the Users: Using Digital Signatures to Solve the Spam Problem, FirstMonday 8 (9).
-
(2003)
FirstMonday
, vol.8
, Issue.9
-
-
Tompkins, T.1
Handley, D.2
-
180
-
-
70449668675
-
Communicating presentation information in internet messages: The content-disposition header field
-
IETF Network Working Group
-
Troost, R., Dorner, S. and Moore, K.: 1997, Communicating Presentation Information in Internet Messages: The Content-Disposition Header Field, RFC 2183, IETF Network Working Group.
-
(1997)
RFC
, vol.2183
-
-
Troost, R.1
Dorner, S.2
Moore, K.3
-
183
-
-
84891998525
-
-
United Nations: 2005, List of Member States, http://www.un.org/Overview/ unmember.html.
-
(2005)
List of Member States
-
-
-
184
-
-
84892113961
-
-
Bundesgesetzblatt Jahrgang 2004 Teil I
-
UWG: 2004, Bundesgesetzblatt Jahrgang 2004 Teil I Nr. 32.
-
(2004)
UWG
, Issue.32
-
-
-
185
-
-
84892134551
-
Enhanced mail system status codes
-
IETF Network Working Group
-
Vaudreuil, G.: 1996, Enhanced Mail System Status Codes, RFC 1893, IETF Network Working Group.
-
(1996)
RFC
, vol.1893
-
-
Vaudreuil, G.1
-
186
-
-
35248831179
-
CAPTCHA: Using hard AI problems for security
-
Von Ahn, L., Blum, M., Hopper, N. and Langford, J.: 2003, CAPTCHA: Using hard AI problems for security, Proceedings of Eurocrypt, pp. 294-311.
-
(2003)
Proceedings of Eurocrypt
, pp. 294-311
-
-
Von Ahn, L.1
Blum, M.2
Hopper, N.3
Langford, J.4
-
187
-
-
2942728016
-
Telling humans and computers apart automatically
-
Von Ahn, L., Blum, M. and Langford, J.: 2004, Telling Humans and Computers Apart Automatically, Communications of the ACM 47(2), 57-60.
-
(2004)
Communications of the ACM
, vol.47
, Issue.2
, pp. 57-60
-
-
Von Ahn, L.1
Blum, M.2
Langford, J.3
-
190
-
-
84892105785
-
Sender policy framework (SPF) for authorizing use of domains in E-MAIL, version 1
-
IETF Network Working Group
-
Wong, M. and Schlitt, W.: 2005, Sender Policy Framework (SPF) for Authorizing Use of Domains in E-MAIL, version 1, Internet draft, IETF Network Working Group.
-
(2005)
Internet Draft
-
-
Wong, M.1
Schlitt, W.2
-
191
-
-
33646000168
-
Approximate object location and spam filtering on peer-to-peer systems
-
Zhou, F., Zhuang, L., Zhao, B., Huang, L., Joseph, A. and Kubiatowicz, J.: 2003, Approximate object location and spam filtering on peer-to-peer systems, Proceedings of ACM/IFIP/USENIX International Middleware Conference.
-
(2003)
Proceedings of ACM/IFIP/USENIX International Middleware Conference
-
-
Zhou, F.1
Zhuang, L.2
Zhao, B.3
Huang, L.4
Joseph, A.5
Kubiatowicz, J.6
|