Sciweavers

1592 search results - page 1 / 319
» The state of the email address
Sort
View
CCR
2004
84views more  CCR 2004»
13 years 4 months ago
The state of the email address
Electronic mail is an unquestionably vital component of the Internet infrastructure. While the general perception of email is that it "just works," surprisingly little d...
Mike Afergan, Robert Beverly
CISC
2005
Springer
109views Cryptology» more  CISC 2005»
13 years 10 months ago
Enforcing Email Addresses Privacy Using Tokens
We propose a system which allows users to monitor how their email addresses are used and how they spread over the Internet. This protects the privacy of the user and can reduce the...
Roman Schlegel, Serge Vaudenay
CEAS
2004
Springer
13 years 10 months ago
IP Addresses in Email Clients
IP addresses are an important tool for fighting spam, used for safe lists, blackhole lists, anti-spoofing and related purposes. While it is trivial to find the sender’s IP add...
Joshua Goodman
CEAS
2008
Springer
13 years 6 months ago
Do Zebras get more Spam than Aardvarks?
Analysis of traffic logs of email received by a large UK ISP shows considerable disparity between the proportions of spam received by addresses with different first characters. Th...
Richard Clayton
USENIX
2003
13 years 6 months ago
Undo for Operators: Building an Undoable E-mail Store
System operators play a critical role in maintaining server dependability yet lack powerful tools to help them do so. To help address this unfulfilled need, we describe Operator U...
Aaron B. Brown, David A. Patterson