Sciweavers

775 search results - page 119 / 155
» Email data cleaning
Sort
View
NDSS
2006
IEEE
15 years 3 months ago
Inoculating SSH Against Address Harvesting
Address harvesting is the act of searching a compromised host for the names and addresses of other targets to attack, such as occurs when an email virus locates target addresses f...
Stuart E. Schechter, Jaeyeon Jung, Will Stockwell,...
WPES
2004
ACM
15 years 3 months ago
Off-the-record communication, or, why not to use PGP
Quite often on the Internet, cryptography is used to protect private, personal communications. However, most commonly, systems such as PGP are used, which use long-lived encryptio...
Nikita Borisov, Ian Goldberg, Eric A. Brewer
HICSS
2003
IEEE
123views Biometrics» more  HICSS 2003»
15 years 3 months ago
Adoption of Collaboration Information Technologies in Australian and US Organizations: A Comparative Study
Collaboration to accomplish tasks has taken on a new meaning over the past few years. The majority of organizations are viewing information technology (IT) as a key enabler to tra...
Deepinder S. Bajwa, L. Floyd Lewis, Graham Pervan
ACSC
2000
IEEE
15 years 2 months ago
Needles and Haystacks: A Search Engine for Personal Information Collections
Information retrieval systems can be partitioned into two main classes: large-scale systems that make use of an inverted index or some other auxiliary data structure, intended for...
Owen de Kretser, Alistair Moffat
CHI
2000
ACM
15 years 2 months ago
Jotmail: a voicemail interface that enables you to see what was said
Voicemail is a pervasive, but under-researched tool for workplace communication. Despite potential advantages of voicemail over email, current phone-based voicemail UIs are highly...
Steve Whittaker, Richard Davis, Julia Hirschberg, ...