: E-Mail is the most exploited service in the Internet. We present an application based on Java mobile agents to automatically perform required steps to register an account. The us...
Email has become overloaded as users make use of email tools for performing a wide range of activities. Previous studies have demonstrated the different strategies employed by ema...
Capturing an e-mail worm and containing its propagation as early as possible is desirable in order to provide better protection for the networks and hosts against severe damage th...
Chin-Tser Huang, Nathan L. Johnson, Jeff Janies, A...
In various settings, such as when customers use the same passwords at several independent web sites, security decisions by one organization may have a significant impact on the s...
Reiko Ann Miura-Ko, Benjamin Yolken, John Mitchell...
In this paper we formalize the notion of a ring signature, which makes it possible to specify a set of possible signers without revealing which member actually produced the signatu...